Analysis
-
max time kernel
10s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
14-12-2020 16:32
Behavioral task
behavioral1
Sample
ca0fe9fdf17e57cb1ef928541306af9a.exe
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ca0fe9fdf17e57cb1ef928541306af9a.exe
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
ca0fe9fdf17e57cb1ef928541306af9a.exe
-
Size
812KB
-
MD5
ca0fe9fdf17e57cb1ef928541306af9a
-
SHA1
d4b1c06c4726be24dd2c1d5a709a88c552459c51
-
SHA256
541da4c942bdad70c87fc063967d7cfac77f99c7b2b2b0b271bf31a9558dd8de
-
SHA512
9fff777624aa140ae06ce965ce1fb51aa6b529a73fc0e493c08f6e96f830f533406460fce6fb8fbdb774e8fab0a46bbeab9d546fdaad49e5a3b4b5149c5c5bb1
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ca0fe9fdf17e57cb1ef928541306af9a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CSRLT.EXE = "C:\\Windows\\system32\\CSRLT.EXE" ca0fe9fdf17e57cb1ef928541306af9a.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ca0fe9fdf17e57cb1ef928541306af9a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\MSBLT.EXE = "C:\\Windows\\MSBLT.EXE" ca0fe9fdf17e57cb1ef928541306af9a.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\CSRLT.EXE ca0fe9fdf17e57cb1ef928541306af9a.exe File created C:\Windows\SysWOW64\CSRLT.EXE ca0fe9fdf17e57cb1ef928541306af9a.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\MSBLT.EXE ca0fe9fdf17e57cb1ef928541306af9a.exe File opened for modification C:\Windows\MSBLT.EXE ca0fe9fdf17e57cb1ef928541306af9a.exe