Analysis
-
max time kernel
2s -
max time network
8s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14/12/2020, 15:21
Behavioral task
behavioral1
Sample
83a813b3de1ad4b803fe29705d2142c0.exe
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
83a813b3de1ad4b803fe29705d2142c0.exe
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
83a813b3de1ad4b803fe29705d2142c0.exe
-
Size
1.6MB
-
MD5
83a813b3de1ad4b803fe29705d2142c0
-
SHA1
4fca64043da75764db7887dcf09022e6c8b493d6
-
SHA256
5c726df30e5687619d85e5fd1a17e620f387b7a66934eca1e033db11d35f6ce3
-
SHA512
9533abc240b7326b2b2bb4f1a8e051fd4dcf83c27da857be9d2bcc5113dad6fe22564054935a703fdd2eec033227e8771087de3629d80b424d228faf8cf45e1c
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 83a813b3de1ad4b803fe29705d2142c0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\MSBLT.EXE = "C:\\Windows\\MSBLT.EXE" 83a813b3de1ad4b803fe29705d2142c0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 83a813b3de1ad4b803fe29705d2142c0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CSRLT.EXE = "C:\\Windows\\system32\\CSRLT.EXE" 83a813b3de1ad4b803fe29705d2142c0.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\CSRLT.EXE 83a813b3de1ad4b803fe29705d2142c0.exe File opened for modification C:\Windows\SysWOW64\CSRLT.EXE 83a813b3de1ad4b803fe29705d2142c0.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\MSBLT.EXE 83a813b3de1ad4b803fe29705d2142c0.exe File opened for modification C:\Windows\MSBLT.EXE 83a813b3de1ad4b803fe29705d2142c0.exe