Analysis
-
max time kernel
12s -
max time network
118s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
14-12-2020 16:33
Behavioral task
behavioral1
Sample
cae501a827511befbaf235b41cac610f.exe
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
cae501a827511befbaf235b41cac610f.exe
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
cae501a827511befbaf235b41cac610f.exe
-
Size
4.9MB
-
MD5
cae501a827511befbaf235b41cac610f
-
SHA1
ed81b0b21826e8ec6290df4dd0baa8f0a7a06a71
-
SHA256
39105f14c1ee7da7d72358a26cfe0f09fd4502a2b00b1f4e56558a64549cdf8a
-
SHA512
c4a1608a8d1296ee8017ef99178fb991a0ffa3c74f37388f19a9d0c671c894b01193ff1b1cdd4d0608f9d8e10ee971a7d9881a71a0c9f0c9c679573d5930d084
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run cae501a827511befbaf235b41cac610f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CSRLT.EXE = "C:\\Windows\\system32\\CSRLT.EXE" cae501a827511befbaf235b41cac610f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cae501a827511befbaf235b41cac610f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\MSBLT.EXE = "C:\\Windows\\MSBLT.EXE" cae501a827511befbaf235b41cac610f.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\CSRLT.EXE cae501a827511befbaf235b41cac610f.exe File opened for modification C:\Windows\SysWOW64\CSRLT.EXE cae501a827511befbaf235b41cac610f.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\MSBLT.EXE cae501a827511befbaf235b41cac610f.exe File created C:\Windows\MSBLT.EXE cae501a827511befbaf235b41cac610f.exe