Analysis
-
max time kernel
2s -
max time network
142s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
08-05-2021 18:59
Behavioral task
behavioral1
Sample
31ec1255985aa04711ca49f867f50fec6f0cb0def2b229e50558238b77db4ad6.exe
Resource
win7v20210410
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
31ec1255985aa04711ca49f867f50fec6f0cb0def2b229e50558238b77db4ad6.exe
Resource
win10v20210408
0 signatures
0 seconds
General
-
Target
31ec1255985aa04711ca49f867f50fec6f0cb0def2b229e50558238b77db4ad6.exe
-
Size
812KB
-
MD5
1b2bf217ac8f4e9f48d28f1a1af994c3
-
SHA1
37a60a6f28d18cf66b9d615d0d14a8d2004558ab
-
SHA256
31ec1255985aa04711ca49f867f50fec6f0cb0def2b229e50558238b77db4ad6
-
SHA512
99ab9dd7e8dd04f5baf5e12dd4cca1480d146f153fd73164d6e153a05aa242b13d2ee5617465a615de3af9591a8c827c1b4c591e9d6851ab6841301d1549f11b
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 31ec1255985aa04711ca49f867f50fec6f0cb0def2b229e50558238b77db4ad6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CSRLT.EXE = "C:\\Windows\\system32\\CSRLT.EXE" 31ec1255985aa04711ca49f867f50fec6f0cb0def2b229e50558238b77db4ad6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 31ec1255985aa04711ca49f867f50fec6f0cb0def2b229e50558238b77db4ad6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\MSBLT.EXE = "C:\\Windows\\MSBLT.EXE" 31ec1255985aa04711ca49f867f50fec6f0cb0def2b229e50558238b77db4ad6.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\CSRLT.EXE 31ec1255985aa04711ca49f867f50fec6f0cb0def2b229e50558238b77db4ad6.exe File opened for modification C:\Windows\SysWOW64\CSRLT.EXE 31ec1255985aa04711ca49f867f50fec6f0cb0def2b229e50558238b77db4ad6.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\MSBLT.EXE 31ec1255985aa04711ca49f867f50fec6f0cb0def2b229e50558238b77db4ad6.exe File opened for modification C:\Windows\MSBLT.EXE 31ec1255985aa04711ca49f867f50fec6f0cb0def2b229e50558238b77db4ad6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\31ec1255985aa04711ca49f867f50fec6f0cb0def2b229e50558238b77db4ad6.exe"C:\Users\Admin\AppData\Local\Temp\31ec1255985aa04711ca49f867f50fec6f0cb0def2b229e50558238b77db4ad6.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
PID:772