Analysis
-
max time kernel
122s -
max time network
136s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
09-05-2021 17:55
Behavioral task
behavioral1
Sample
ba4d69bf189f3b503a041e5f9d74be6512ead7d7e681f0637a67ece28e9bc475.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ba4d69bf189f3b503a041e5f9d74be6512ead7d7e681f0637a67ece28e9bc475.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
ba4d69bf189f3b503a041e5f9d74be6512ead7d7e681f0637a67ece28e9bc475.exe
-
Size
1.6MB
-
MD5
9fbec565d87c9591cbec99dced2105c2
-
SHA1
d5d9d74fc875298d90108862732f4c165fa33a52
-
SHA256
ba4d69bf189f3b503a041e5f9d74be6512ead7d7e681f0637a67ece28e9bc475
-
SHA512
253792d780006f6bf0128e4898f8c476a66e10494a0465e0ea8978ac61a5cefa99b9acabc17e9e1a99ac156972da05b04171df34ce1c46a75b1c7f54d7b3cd1e
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ba4d69bf189f3b503a041e5f9d74be6512ead7d7e681f0637a67ece28e9bc475.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CSRLT.EXE = "C:\\Windows\\system32\\CSRLT.EXE" ba4d69bf189f3b503a041e5f9d74be6512ead7d7e681f0637a67ece28e9bc475.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ba4d69bf189f3b503a041e5f9d74be6512ead7d7e681f0637a67ece28e9bc475.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\MSBLT.EXE = "C:\\Windows\\MSBLT.EXE" ba4d69bf189f3b503a041e5f9d74be6512ead7d7e681f0637a67ece28e9bc475.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\CSRLT.EXE ba4d69bf189f3b503a041e5f9d74be6512ead7d7e681f0637a67ece28e9bc475.exe File opened for modification C:\Windows\SysWOW64\CSRLT.EXE ba4d69bf189f3b503a041e5f9d74be6512ead7d7e681f0637a67ece28e9bc475.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\MSBLT.EXE ba4d69bf189f3b503a041e5f9d74be6512ead7d7e681f0637a67ece28e9bc475.exe File opened for modification C:\Windows\MSBLT.EXE ba4d69bf189f3b503a041e5f9d74be6512ead7d7e681f0637a67ece28e9bc475.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba4d69bf189f3b503a041e5f9d74be6512ead7d7e681f0637a67ece28e9bc475.exe"C:\Users\Admin\AppData\Local\Temp\ba4d69bf189f3b503a041e5f9d74be6512ead7d7e681f0637a67ece28e9bc475.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
PID:3876