Analysis
-
max time kernel
3s -
max time network
8s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14-12-2020 15:26
Behavioral task
behavioral1
Sample
87b428117541bfbed776883f21075c3e.exe
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
87b428117541bfbed776883f21075c3e.exe
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
87b428117541bfbed776883f21075c3e.exe
-
Size
4.2MB
-
MD5
87b428117541bfbed776883f21075c3e
-
SHA1
53fedfccc1c7749c5f4e92b8a472d3dbcc473a16
-
SHA256
5b37bac255ef38eef9681be25ddddfa6a9f5d5c3717b6496f754ba2829a45053
-
SHA512
a63b9a60d8e96b6ab23a564abdd10c26a22fd6281081387fb7cd7aeae48479ba4283e66e322d3ce4fd5c22dfdd50b288feb6104c2bd0aae37eec1d43d20fd490
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\MSBLT.EXE = "C:\\Windows\\MSBLT.EXE" 87b428117541bfbed776883f21075c3e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 87b428117541bfbed776883f21075c3e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CSRLT.EXE = "C:\\Windows\\system32\\CSRLT.EXE" 87b428117541bfbed776883f21075c3e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 87b428117541bfbed776883f21075c3e.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\CSRLT.EXE 87b428117541bfbed776883f21075c3e.exe File opened for modification C:\Windows\SysWOW64\CSRLT.EXE 87b428117541bfbed776883f21075c3e.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\MSBLT.EXE 87b428117541bfbed776883f21075c3e.exe File opened for modification C:\Windows\MSBLT.EXE 87b428117541bfbed776883f21075c3e.exe