Summary | ZeroBOX

csrss.exe

Backdoor Client SW User Data Stealer RemcosRAT info stealer browser Chrome Malicious Library Malicious Packer Downloader Antivirus UPX Google User Data DNS ScreenShot Create Service KeyLogger Internet API Socket Escalate priviledges PWS Sniff Audio
Category Machine Started Completed
FILE s1_win7_x6403_us June 19, 2024, 9:55 a.m. June 19, 2024, 10:02 a.m.
Size 3.0MB
Type PE32+ executable (console) x86-64, for MS Windows
MD5 08475c0ab2386f3353d1c2f254a839c3
SHA256 d613abfde1e416e467b1b936060835b5dff7d3617cfd54dba245f36a214ddd6a
CRC32 B343C2AC
ssdeep 49152:YgpOmgDQ06m3N051GXdJCXw5Y9ehIwM1A8ofwosSN7Wn:CDDe4Rh0HiK
Yara
  • Malicious_Packer_Zero - Malicious Packer
  • Malicious_Library_Zero - Malicious_Library
  • IsPE64 - (no description)
  • PE_Header_Zero - PE File Signature
  • Antivirus - Contains references to security software
  • UPX_Zero - UPX packed file
  • OS_Processor_Check_Zero - OS Processor Check

IP Address Status Action
107.173.4.18 Active Moloch
164.124.101.2 Active Moloch
178.237.33.50 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49164 -> 107.173.4.18:30902 2036594 ET JA3 Hash - Remcos 3.x/4.x TLS Connection Malware Command and Control Activity Detected

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.3
192.168.56.103:49164
107.173.4.18:30902
None None None

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
section .managed
section hydrated
resource name BINARY
suspicious_features GET method with no useragent header suspicious_request GET http://geoplugin.net/json.gp
request GET http://geoplugin.net/json.gp
section {u'size_of_data': u'0x000e5600', u'virtual_address': u'0x00203000', u'entropy': 6.8281912281199775, u'name': u'.rdata', u'virtual_size': u'0x000e5454'} entropy 6.82819122812 description A section with a high entropy has been found
section {u'size_of_data': u'0x00079400', u'virtual_address': u'0x00316000', u'entropy': 7.999350725955562, u'name': u'.rsrc', u'virtual_size': u'0x000792c8'} entropy 7.99935072596 description A section with a high entropy has been found
entropy 0.450096277279 description Overall entropy of this PE file is high
description Create a windows service rule Create_Service
description Client_SW_User_Data_Stealer rule Client_SW_User_Data_Stealer
description Win Backdoor RemcosRAT rule Win_Backdoor_RemcosRAT
description Communications over RAW Socket rule Network_TCP_Socket
description browser info stealer rule infoStealer_browser_Zero
description Take ScreenShot rule ScreenShot
description Escalate priviledges rule Escalate_priviledges
description Google Chrome User Data Check rule Chrome_User_Data_Check_Zero
description PWS Memory rule Generic_PWS_Memory_Zero
description Record Audio rule Sniff_Audio
description Communications use DNS rule Network_DNS
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description Affect hook table rule win_hook
description File Downloader rule Network_Downloader
description Match Windows Inet API call rule Str_Win32_Internet_API
description Run a KeyLogger rule KeyLogger
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2112
region_size: 532480
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000110
1 0 0
Process injection Process 1948 resumed a thread in remote process 2112
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x000000000000010c
suspend_count: 1
process_identifier: 2112
1 0 0
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000000000000b0
suspend_count: 1
process_identifier: 1948
1 0 0

NtResumeThread

thread_handle: 0x00000000000000ec
suspend_count: 1
process_identifier: 1948
1 0 0

CreateProcessInternalW

thread_identifier: 2116
thread_handle: 0x000000000000010c
process_identifier: 2112
current_directory:
filepath: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
track: 1
command_line:
filepath_r: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
stack_pivoted: 0
creation_flags: 4 (CREATE_SUSPENDED)
inherit_handles: 0
process_handle: 0x0000000000000110
1 1 0

NtUnmapViewOfSection

base_address: 0x0000000000400000
region_size: 7733248
process_identifier: 2112
process_handle: 0x0000000000000110
-1073741799 0

NtAllocateVirtualMemory

process_identifier: 2112
region_size: 532480
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000000400000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0x0000000000000110
1 0 0

NtResumeThread

thread_handle: 0x000000000000010c
suspend_count: 1
process_identifier: 2112
1 0 0
Lionic Trojan.Win32.Remcos.m!c
Elastic malicious (moderate confidence)
ALYac Gen:Variant.Lazy.550625
VIPRE Gen:Variant.Lazy.550625
Sangfor Backdoor.Win32.Kryptik.V18p
BitDefender Gen:Variant.Lazy.550625
Cybereason malicious.ab2386
VirIT Trojan.Win64.Genus.GVM
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win64/Kryptik.EKY
Avast FileRepMalware [Rat]
Kaspersky Backdoor.Win32.Remcos.ycb
MicroWorld-eScan Gen:Variant.Lazy.550625
Rising Stealer.Convagent!8.1326D (CLOUD)
Emsisoft Gen:Variant.Lazy.550625 (B)
DrWeb Trojan.DownLoader47.3994
TrendMicro Backdoor.Win64.REMCOS.YXEFRZ
McAfeeD ti!D613ABFDE1E4
FireEye Gen:Variant.Lazy.550625
Sophos Mal/Generic-S
Ikarus Win32.Outbreak
Webroot W32.Malware.Gen
Google Detected
MAX malware (ai score=86)
Kingsoft Win32.Troj.Unknown.a
Gridinsoft Trojan.Win64.Remcos.tr
Arcabit Trojan.Lazy.D866E1
ZoneAlarm Backdoor.Win32.Remcos.ycb
Varist W64/ABRisk.KMWE-1328
AhnLab-V3 Trojan/Win.Generic.C5641290
DeepInstinct MALICIOUS
Malwarebytes Trojan.MalPack
Panda Trj/Chgt.AD
TrendMicro-HouseCall Backdoor.Win64.REMCOS.YXEFRZ
Yandex Trojan.PWS.Agensla!IeG/EetC8ic
MaxSecure Win.MxResIcn.Heur.Gen
Fortinet W64/GenKryptik.MAGC!tr
AVG FileRepMalware [Rat]
Paloalto generic.ml
alibabacloud Trojan:Win/Kryptik.EHT