Report - csrss.exe

Client SW User Data Stealer Backdoor RemcosRAT browser info stealer Google Chrome User Data Downloader Malicious Library Malicious Packer Antivirus UPX Create Service Socket ScreenShot Escalate priviledges PWS Sniff Audio DNS Internet API KeyLogger AntiDe
ScreenShot
Created 2024.07.26 18:42 Machine s1_win7_x6403
Filename csrss.exe
Type PE32+ executable (GUI) x86-64, for MS Windows
AI Score
2
Behavior Score
6.2
ZERO API file : mailcious
VT API (file) 19 detected (AIDetectMalware, malicious, high confidence, Attribute, HighConfidence, GenKryptik, GZZF, MalwareX, CLASSIC, Detected, Sabsik, susgen, MAGC)
md5 4fb3e6e7b8f9c12cd2d5e161f7b94760
sha256 f76f9b85df2ba8850bec058164d2c752c8fd8ef0f1bcffd793e5f453d8a839bb
ssdeep 49152:Og7eO7kjTav5AwVZGsY3uS+s1vm1lvt+vU0JSziMwqM:j7lmmUM7wq
imphash fa79c8f1c618648f2275daa90f4c6120
impfuzzy 96:C6KC7Xg9NS9u7JcxL/eQUKU5ja9VmHTXrR9X1sqPIXeQkyqdLznkyB:CF0Q9NtkVST7R9FsoIuD/nkyB
  Network IP location

Signature (14cnts)

Level Description
danger Executed a process and injected code into it
watch Allocates execute permission to another process indicative of possible code injection
watch File has been identified by 19 AntiVirus engines on VirusTotal as malicious
watch Manipulates memory of a non-child process indicative of process injection
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice One or more potentially interesting buffers were extracted
notice Performs some HTTP requests
notice The binary likely contains encrypted or compressed data indicative of a packer
notice Yara rule detected in process memory
info Checks amount of memory in system
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path

Rules (30cnts)

Level Name Description Collection
danger Client_SW_User_Data_Stealer Client_SW_User_Data_Stealer memory
danger Win_Backdoor_RemcosRAT Win Backdoor RemcosRAT memory
warning infoStealer_browser_Zero browser info stealer memory
watch Antivirus Contains references to security software binaries (upload)
watch Chrome_User_Data_Check_Zero Google Chrome User Data Check memory
watch Malicious_Library_Zero Malicious_Library binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
watch Network_Downloader File Downloader memory
watch UPX_Zero UPX packed file binaries (upload)
notice Create_Service Create a windows service memory
notice Escalate_priviledges Escalate priviledges memory
notice Generic_PWS_Memory_Zero PWS Memory memory
notice KeyLogger Run a KeyLogger memory
notice Network_DNS Communications use DNS memory
notice Network_TCP_Socket Communications over RAW Socket memory
notice ScreenShot Take ScreenShot memory
notice Sniff_Audio Record Audio memory
notice Str_Win32_Internet_API Match Windows Inet API call memory
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info IsPE64 (no description) binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory
info win_hook Affect hook table memory

Network (5cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://geoplugin.net/json.gp NL Schuberg Philis B.V. 178.237.33.50 clean
geoplugin.net NL Schuberg Philis B.V. 178.237.33.50 clean
unifrieghtmovers.com US AS-COLOCROSSING 23.95.60.82 clean
178.237.33.50 NL Schuberg Philis B.V. 178.237.33.50 clean
23.95.60.82 US AS-COLOCROSSING 23.95.60.82 clean

Suricata ids

PE API

IAT(Import Address Table) Library

ADVAPI32.dll
 0x14019b000 RegCloseKey
 0x14019b008 RegEnumValueW
 0x14019b010 RegOpenKeyExW
 0x14019b018 RegQueryValueExW
 0x14019b020 RegCreateKeyExW
 0x14019b028 RegDeleteKeyExW
 0x14019b030 RegDeleteValueW
 0x14019b038 RegEnumKeyExW
 0x14019b040 RegFlushKey
 0x14019b048 RegQueryInfoKeyW
 0x14019b050 RegSetValueExW
 0x14019b058 CreateWellKnownSid
 0x14019b060 GetWindowsAccountDomainSid
 0x14019b068 LookupPrivilegeValueW
 0x14019b070 RevertToSelf
 0x14019b078 OpenThreadToken
 0x14019b080 OpenProcessToken
 0x14019b088 SetThreadToken
 0x14019b090 AdjustTokenPrivileges
 0x14019b098 DuplicateTokenEx
 0x14019b0a0 GetSecurityDescriptorLength
 0x14019b0a8 EventWrite
 0x14019b0b0 EventRegister
 0x14019b0b8 EventEnabled
crypt.dll
 0x14019b6a8 BCryptGenRandom
 0x14019b6b0 BCryptEncrypt
 0x14019b6b8 BCryptDecrypt
 0x14019b6c0 BCryptImportKey
 0x14019b6c8 BCryptOpenAlgorithmProvider
 0x14019b6d0 BCryptCloseAlgorithmProvider
 0x14019b6d8 BCryptDestroyKey
 0x14019b6e0 BCryptSetProperty
KERNEL32.dll
 0x14019b0c8 TlsFree
 0x14019b0d0 TlsSetValue
 0x14019b0d8 TlsGetValue
 0x14019b0e0 TlsAlloc
 0x14019b0e8 InitializeCriticalSectionAndSpinCount
 0x14019b0f0 EncodePointer
 0x14019b0f8 RaiseException
 0x14019b100 RtlPcToFileHeader
 0x14019b108 CloseThreadpoolIo
 0x14019b110 GetStdHandle
 0x14019b118 FileTimeToSystemTime
 0x14019b120 SystemTimeToFileTime
 0x14019b128 GetSystemTime
 0x14019b130 GetCalendarInfoEx
 0x14019b138 CompareStringOrdinal
 0x14019b140 CompareStringEx
 0x14019b148 FindNLSStringEx
 0x14019b150 GetLocaleInfoEx
 0x14019b158 ResolveLocaleName
 0x14019b160 FindStringOrdinal
 0x14019b168 GetTickCount64
 0x14019b170 GetCurrentProcess
 0x14019b178 GetCurrentThread
 0x14019b180 Sleep
 0x14019b188 InitializeCriticalSection
 0x14019b190 InitializeConditionVariable
 0x14019b198 DeleteCriticalSection
 0x14019b1a0 LocalFree
 0x14019b1a8 EnterCriticalSection
 0x14019b1b0 SleepConditionVariableCS
 0x14019b1b8 LeaveCriticalSection
 0x14019b1c0 WakeConditionVariable
 0x14019b1c8 QueryPerformanceCounter
 0x14019b1d0 WaitForMultipleObjectsEx
 0x14019b1d8 GetLastError
 0x14019b1e0 QueryPerformanceFrequency
 0x14019b1e8 SetLastError
 0x14019b1f0 GetFullPathNameW
 0x14019b1f8 GetLongPathNameW
 0x14019b200 MultiByteToWideChar
 0x14019b208 WideCharToMultiByte
 0x14019b210 LocalAlloc
 0x14019b218 GetConsoleOutputCP
 0x14019b220 GetProcAddress
 0x14019b228 RaiseFailFastException
 0x14019b230 CreateThreadpoolIo
 0x14019b238 StartThreadpoolIo
 0x14019b240 CancelThreadpoolIo
 0x14019b248 LocaleNameToLCID
 0x14019b250 LCMapStringEx
 0x14019b258 EnumTimeFormatsEx
 0x14019b260 EnumCalendarInfoExEx
 0x14019b268 CopyFileExW
 0x14019b270 CreateFileW
 0x14019b278 DeleteFileW
 0x14019b280 DeviceIoControl
 0x14019b288 ExpandEnvironmentStringsW
 0x14019b290 FindClose
 0x14019b298 FindFirstFileExW
 0x14019b2a0 FlushFileBuffers
 0x14019b2a8 FreeLibrary
 0x14019b2b0 GetFileAttributesExW
 0x14019b2b8 GetFileInformationByHandleEx
 0x14019b2c0 GetFileType
 0x14019b2c8 GetModuleFileNameW
 0x14019b2d0 GetOverlappedResult
 0x14019b2d8 LoadLibraryExW
 0x14019b2e0 ReadFile
 0x14019b2e8 SetFileInformationByHandle
 0x14019b2f0 SetThreadErrorMode
 0x14019b2f8 WriteFile
 0x14019b300 GetCurrentProcessorNumberEx
 0x14019b308 CloseHandle
 0x14019b310 SetEvent
 0x14019b318 ResetEvent
 0x14019b320 CreateEventExW
 0x14019b328 GetEnvironmentVariableW
 0x14019b330 FormatMessageW
 0x14019b338 DuplicateHandle
 0x14019b340 GetThreadPriority
 0x14019b348 SetThreadPriority
 0x14019b350 CreateProcessA
 0x14019b358 GetConsoleWindow
 0x14019b360 GetModuleHandleA
 0x14019b368 FreeConsole
 0x14019b370 AllocConsole
 0x14019b378 CreateProcessW
 0x14019b380 GetThreadContext
 0x14019b388 ExitProcess
 0x14019b390 FlushProcessWriteBuffers
 0x14019b398 GetCurrentThreadId
 0x14019b3a0 WaitForSingleObjectEx
 0x14019b3a8 VirtualQuery
 0x14019b3b0 RtlRestoreContext
 0x14019b3b8 AddVectoredExceptionHandler
 0x14019b3c0 FlsAlloc
 0x14019b3c8 FlsGetValue
 0x14019b3d0 FlsSetValue
 0x14019b3d8 CreateEventW
 0x14019b3e0 TerminateProcess
 0x14019b3e8 SwitchToThread
 0x14019b3f0 CreateThread
 0x14019b3f8 SuspendThread
 0x14019b400 ResumeThread
 0x14019b408 SetThreadContext
 0x14019b410 FlushInstructionCache
 0x14019b418 VirtualAlloc
 0x14019b420 VirtualProtect
 0x14019b428 VirtualFree
 0x14019b430 QueryInformationJobObject
 0x14019b438 GetModuleHandleW
 0x14019b440 GetModuleHandleExW
 0x14019b448 GetProcessAffinityMask
 0x14019b450 InitializeContext
 0x14019b458 GetEnabledXStateFeatures
 0x14019b460 SetXStateFeaturesMask
 0x14019b468 InitializeCriticalSectionEx
 0x14019b470 GetSystemTimeAsFileTime
 0x14019b478 DebugBreak
 0x14019b480 WaitForSingleObject
 0x14019b488 SleepEx
 0x14019b490 GlobalMemoryStatusEx
 0x14019b498 GetSystemInfo
 0x14019b4a0 GetLogicalProcessorInformation
 0x14019b4a8 GetLogicalProcessorInformationEx
 0x14019b4b0 GetLargePageMinimum
 0x14019b4b8 VirtualUnlock
 0x14019b4c0 VirtualAllocExNuma
 0x14019b4c8 IsProcessInJob
 0x14019b4d0 GetNumaHighestNodeNumber
 0x14019b4d8 GetProcessGroupAffinity
 0x14019b4e0 K32GetProcessMemoryInfo
 0x14019b4e8 RtlUnwindEx
 0x14019b4f0 IsProcessorFeaturePresent
 0x14019b4f8 SetUnhandledExceptionFilter
 0x14019b500 UnhandledExceptionFilter
 0x14019b508 IsDebuggerPresent
 0x14019b510 RtlVirtualUnwind
 0x14019b518 RtlLookupFunctionEntry
 0x14019b520 RtlCaptureContext
 0x14019b528 InitializeSListHead
 0x14019b530 GetCurrentProcessId
ole32.dll
 0x14019b6f0 CoUninitialize
 0x14019b6f8 CoTaskMemAlloc
 0x14019b700 CoGetApartmentType
 0x14019b708 CoCreateGuid
 0x14019b710 CoTaskMemFree
 0x14019b718 CoWaitForMultipleHandles
 0x14019b720 CoInitializeEx
api-ms-win-crt-math-l1-1-0.dll
 0x14019b580 __setusermatherr
 0x14019b588 ceil
api-ms-win-crt-heap-l1-1-0.dll
 0x14019b540 calloc
 0x14019b548 free
 0x14019b550 _callnewh
 0x14019b558 _set_new_mode
 0x14019b560 malloc
api-ms-win-crt-string-l1-1-0.dll
 0x14019b670 wcsncmp
 0x14019b678 strncpy_s
 0x14019b680 _stricmp
 0x14019b688 strcpy_s
 0x14019b690 strcmp
 0x14019b698 _wcsicmp
api-ms-win-crt-runtime-l1-1-0.dll
 0x14019b598 _c_exit
 0x14019b5a0 _register_thread_local_exe_atexit_callback
 0x14019b5a8 _get_initial_wide_environment
 0x14019b5b0 _cexit
 0x14019b5b8 __p___wargv
 0x14019b5c0 __p___argc
 0x14019b5c8 _exit
 0x14019b5d0 exit
 0x14019b5d8 _initterm_e
 0x14019b5e0 _initterm
 0x14019b5e8 terminate
 0x14019b5f0 _crt_atexit
 0x14019b5f8 _initialize_wide_environment
 0x14019b600 _register_onexit_function
 0x14019b608 _initialize_onexit_table
 0x14019b610 _configure_wide_argv
 0x14019b618 _set_app_type
 0x14019b620 _seh_filter_exe
 0x14019b628 abort
api-ms-win-crt-stdio-l1-1-0.dll
 0x14019b638 __stdio_common_vsprintf_s
 0x14019b640 __stdio_common_vsscanf
 0x14019b648 __stdio_common_vfprintf
 0x14019b650 __acrt_iob_func
 0x14019b658 _set_fmode
 0x14019b660 __p__commode
api-ms-win-crt-locale-l1-1-0.dll
 0x14019b570 _configthreadlocale

EAT(Export Address Table) Library

0x140261360 DotNetRuntimeDebugHeader


Similarity measure (PE file only) - Checking for service failure