Analysis
-
max time kernel
6s -
max time network
14s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
25-06-2021 20:02
Behavioral task
behavioral1
Sample
33c51b43362ef9a681a851d192942ef3857f550a3d36ca808b7d2c37abd9ea67.exe
Resource
win7v20210408
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
33c51b43362ef9a681a851d192942ef3857f550a3d36ca808b7d2c37abd9ea67.exe
Resource
win10v20210408
0 signatures
0 seconds
General
-
Target
33c51b43362ef9a681a851d192942ef3857f550a3d36ca808b7d2c37abd9ea67.exe
-
Size
711KB
-
MD5
1cbd59d894ee4a48ec6aee6d149f4ab1
-
SHA1
bd1b2c9041cd3bdc801db90234412f7b60c04b23
-
SHA256
33c51b43362ef9a681a851d192942ef3857f550a3d36ca808b7d2c37abd9ea67
-
SHA512
e101e817ca76ad90f4c736200cd6ada83f7072aa58a4139d61ba1f9df15bee39c2c6c3efa574509a3d1b9fec4a781d4a3a5763a2d0b075bd8b5e7dcd3a0faba1
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 33c51b43362ef9a681a851d192942ef3857f550a3d36ca808b7d2c37abd9ea67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CSRLT.EXE = "C:\\Windows\\system32\\CSRLT.EXE" 33c51b43362ef9a681a851d192942ef3857f550a3d36ca808b7d2c37abd9ea67.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 33c51b43362ef9a681a851d192942ef3857f550a3d36ca808b7d2c37abd9ea67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\MSBLT.EXE = "C:\\Windows\\MSBLT.EXE" 33c51b43362ef9a681a851d192942ef3857f550a3d36ca808b7d2c37abd9ea67.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\CSRLT.EXE 33c51b43362ef9a681a851d192942ef3857f550a3d36ca808b7d2c37abd9ea67.exe File opened for modification C:\Windows\SysWOW64\CSRLT.EXE 33c51b43362ef9a681a851d192942ef3857f550a3d36ca808b7d2c37abd9ea67.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\MSBLT.EXE 33c51b43362ef9a681a851d192942ef3857f550a3d36ca808b7d2c37abd9ea67.exe File opened for modification C:\Windows\MSBLT.EXE 33c51b43362ef9a681a851d192942ef3857f550a3d36ca808b7d2c37abd9ea67.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\33c51b43362ef9a681a851d192942ef3857f550a3d36ca808b7d2c37abd9ea67.exe"C:\Users\Admin\AppData\Local\Temp\33c51b43362ef9a681a851d192942ef3857f550a3d36ca808b7d2c37abd9ea67.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
PID:940