Analysis
-
max time kernel
128s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
01-03-2022 07:17
Behavioral task
behavioral1
Sample
4ab762cafba773df75db301c03a6954c22e7bbbd40ea57cc809931feef64c908.exe
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
4ab762cafba773df75db301c03a6954c22e7bbbd40ea57cc809931feef64c908.exe
Resource
win10v2004-en-20220113
0 signatures
0 seconds
General
-
Target
4ab762cafba773df75db301c03a6954c22e7bbbd40ea57cc809931feef64c908.exe
-
Size
711KB
-
MD5
6d294bc8da276dc986f047130e11d6bc
-
SHA1
ba64def24e9db7f310e5d43d967b3d4093ef68d8
-
SHA256
4ab762cafba773df75db301c03a6954c22e7bbbd40ea57cc809931feef64c908
-
SHA512
0a7383bb3f7f28c7db7839323c90c2aa8c3b70eb3601f1736206d427929f0df3d29d42e2991bec11dcd773d83570227493684ebf77316aed1a31da1771bb2ce0
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4ab762cafba773df75db301c03a6954c22e7bbbd40ea57cc809931feef64c908.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\MSBLT.EXE = "C:\\Windows\\MSBLT.EXE" 4ab762cafba773df75db301c03a6954c22e7bbbd40ea57cc809931feef64c908.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 4ab762cafba773df75db301c03a6954c22e7bbbd40ea57cc809931feef64c908.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CSRLT.EXE = "C:\\Windows\\system32\\CSRLT.EXE" 4ab762cafba773df75db301c03a6954c22e7bbbd40ea57cc809931feef64c908.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\CSRLT.EXE 4ab762cafba773df75db301c03a6954c22e7bbbd40ea57cc809931feef64c908.exe File opened for modification C:\Windows\SysWOW64\CSRLT.EXE 4ab762cafba773df75db301c03a6954c22e7bbbd40ea57cc809931feef64c908.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\MSBLT.EXE 4ab762cafba773df75db301c03a6954c22e7bbbd40ea57cc809931feef64c908.exe File opened for modification C:\Windows\MSBLT.EXE 4ab762cafba773df75db301c03a6954c22e7bbbd40ea57cc809931feef64c908.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ab762cafba773df75db301c03a6954c22e7bbbd40ea57cc809931feef64c908.exe"C:\Users\Admin\AppData\Local\Temp\4ab762cafba773df75db301c03a6954c22e7bbbd40ea57cc809931feef64c908.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
PID:3972