Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
24/03/2025, 02:54
Behavioral task
behavioral1
Sample
2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe
-
Size
9.1MB
-
MD5
d8619186a38fc417025e032d2106997c
-
SHA1
e655177f6952b366078d4f35fd521ac3c114bdd6
-
SHA256
aacafa4db9a782ec4a36ad05fd36d7860460a0808f8c99711468cf295a2ed768
-
SHA512
d60a3459e4d7875ef904e2a24948ab32eb201d77a4386bf24e21993226b7998b7f0c72a18f86d39753471361c8e43966b27b7a2388a1d796b254dc1819dc0a93
-
SSDEEP
98304:GHxMZDJ1TRpxYVX9u2IazANfAhZytTD5iqkv:sxEvYjVzANIhwN2
Malware Config
Signatures
-
Glupteba family
-
Glupteba payload 1 IoCs
resource yara_rule behavioral2/files/0x00080000000242d5-127.dat family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 5500 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 2992 csrss.exe 4832 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe File created C:\Windows\rss\csrss.exe 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe -
pid Process 2752 powershell.exe 3068 powershell.exe 5804 powershell.exe 5196 powershell.exe 2732 powershell.exe 3368 powershell.exe 620 powershell.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-3051 = "Qyzylorda Daylight Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-672 = "AUS Eastern Standard Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2824 schtasks.exe 5096 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3068 powershell.exe 3068 powershell.exe 6088 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 6088 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 5804 powershell.exe 5804 powershell.exe 2232 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 2232 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 2232 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 2232 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 2232 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 2232 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 2232 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 2232 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 2232 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 2232 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 5196 powershell.exe 5196 powershell.exe 2732 powershell.exe 2732 powershell.exe 3368 powershell.exe 3368 powershell.exe 620 powershell.exe 620 powershell.exe 2752 powershell.exe 2752 powershell.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 2992 csrss.exe 2992 csrss.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 2992 csrss.exe 2992 csrss.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe 4832 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 3068 powershell.exe Token: SeDebugPrivilege 6088 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Token: SeImpersonatePrivilege 6088 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe Token: SeDebugPrivilege 5804 powershell.exe Token: SeDebugPrivilege 5196 powershell.exe Token: SeDebugPrivilege 2732 powershell.exe Token: SeDebugPrivilege 3368 powershell.exe Token: SeDebugPrivilege 620 powershell.exe Token: SeDebugPrivilege 2752 powershell.exe Token: SeSystemEnvironmentPrivilege 2992 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 6088 wrote to memory of 3068 6088 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 90 PID 6088 wrote to memory of 3068 6088 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 90 PID 6088 wrote to memory of 3068 6088 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 90 PID 2232 wrote to memory of 5804 2232 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 97 PID 2232 wrote to memory of 5804 2232 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 97 PID 2232 wrote to memory of 5804 2232 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 97 PID 2232 wrote to memory of 4692 2232 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 100 PID 2232 wrote to memory of 4692 2232 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 100 PID 4692 wrote to memory of 5500 4692 cmd.exe 102 PID 4692 wrote to memory of 5500 4692 cmd.exe 102 PID 2232 wrote to memory of 5196 2232 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 104 PID 2232 wrote to memory of 5196 2232 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 104 PID 2232 wrote to memory of 5196 2232 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 104 PID 2232 wrote to memory of 2732 2232 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 106 PID 2232 wrote to memory of 2732 2232 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 106 PID 2232 wrote to memory of 2732 2232 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 106 PID 2232 wrote to memory of 2992 2232 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 109 PID 2232 wrote to memory of 2992 2232 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 109 PID 2232 wrote to memory of 2992 2232 2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe 109 PID 2992 wrote to memory of 3368 2992 csrss.exe 110 PID 2992 wrote to memory of 3368 2992 csrss.exe 110 PID 2992 wrote to memory of 3368 2992 csrss.exe 110 PID 2992 wrote to memory of 620 2992 csrss.exe 115 PID 2992 wrote to memory of 620 2992 csrss.exe 115 PID 2992 wrote to memory of 620 2992 csrss.exe 115 PID 2992 wrote to memory of 2752 2992 csrss.exe 118 PID 2992 wrote to memory of 2752 2992 csrss.exe 118 PID 2992 wrote to memory of 2752 2992 csrss.exe 118 PID 2992 wrote to memory of 4832 2992 csrss.exe 120 PID 2992 wrote to memory of 4832 2992 csrss.exe 120 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6088 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
C:\Users\Admin\AppData\Local\Temp\2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-24_d8619186a38fc417025e032d2106997c_cobalt-strike_frostygoop_gcleaner_poet-rat_sliver_snatch.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5804
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:5500
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5196
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3368
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Scheduled Task/Job: Scheduled Task
PID:2824
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵PID:3672
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:620
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Scheduled Task/Job: Scheduled Task
PID:5096
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD588f2955f1f8f2a4f8b516b7afd4aeefd
SHA120145a7e0b6b32671c52847f5da0158284ac292a
SHA256f7226fa361976677055dd49eab7a0a676003e3c844afb22eb17c12dd8b97574a
SHA51265c79968765f372dedac2f96d169404d75e89982effb980a96a31911ba4b02d6ff1ae30dc8575e0bf87e74c4809e706fbd587cb309ea17c4ee177c703992a8ec
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5dbe611c51311278120f3f5cad317afa5
SHA1afc748ca442a6d9b6a8a539d76ea3ae387d77667
SHA256f27042f455689c11ca5eb4daf8ede8cdc7b53950e3833dbb39749babb331acbd
SHA51237e17ba6ff776be0caeed157ceb963af8bf0ebb8bb52248d4fe147e004236598b6fdd0b329dd33d47df98b29de43a690eef9524978bee81e9b3284f46b065c4f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD539ec7041c0fb606b3541bcb7457995d1
SHA132d09eaa2a11477aaf5a892ed9149f0bfb66fba2
SHA2566c8d5ea4f6ab3512a6d8fcba495570587a4a2c3a677abc25e7f2c3fae49d6000
SHA51295810ff197ad8ded0bcb0b17057e7100506a419c9b7e780e57fc166cd1775be9eaed6e2d38c47c4bcaa49039a1deb042cd1ffc50fa699ba039ed827617a74d8b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a8cbe859b794a4cb0c8b6179eb663073
SHA17591cc5fef657a4e680115bb0b2e2dd39e6d8432
SHA2568e5d6abf997cf55dcdbce60de3b59596c0e229f89f2175d9589c9360a5e616d2
SHA512a4a697ab4b5e6f22b6a9bb6d6c2afdfaf2249629cd8a32f2dc5b30c45e717a30b63c0b9411539552e6a71dd3b2932818da2ca8a8b94b5940eda5b2fdd3f421c0
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59400ad60eb716e6297c1c940030e8bc1
SHA14a41b0cbfcd4c7176649d9f353cac970aa983fdc
SHA256035d399b5a1eb7988be282fb4eb532df3b2e04a471204d5e0d246607a783ed21
SHA512620a5c7fa1aeafbabde43558c46ae34f5cdbf1712c4a67792ae983d1fdac1079b50ebebfaee355976165817f09aab89af9e0c6869025a2cc3532a68e4251b4f6
-
Filesize
9.1MB
MD5d8619186a38fc417025e032d2106997c
SHA1e655177f6952b366078d4f35fd521ac3c114bdd6
SHA256aacafa4db9a782ec4a36ad05fd36d7860460a0808f8c99711468cf295a2ed768
SHA512d60a3459e4d7875ef904e2a24948ab32eb201d77a4386bf24e21993226b7998b7f0c72a18f86d39753471361c8e43966b27b7a2388a1d796b254dc1819dc0a93