Analysis
-
max time kernel
59s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
10-05-2022 23:45
Behavioral task
behavioral1
Sample
9c3c5eeab82227e6bb43af1b64cc0dcdd7d27133d6319cdb31500649e8173379.exe
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
9c3c5eeab82227e6bb43af1b64cc0dcdd7d27133d6319cdb31500649e8173379.exe
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
9c3c5eeab82227e6bb43af1b64cc0dcdd7d27133d6319cdb31500649e8173379.exe
-
Size
6.3MB
-
MD5
0553dcbf35a03442e96f36c9f73d15f1
-
SHA1
44f883196d6d11b791ed35e70967fdac3e5db261
-
SHA256
9c3c5eeab82227e6bb43af1b64cc0dcdd7d27133d6319cdb31500649e8173379
-
SHA512
9eded2f030edbfba581f0dfdf6b51fa1b9d8bbc320cec93070beb0adad4dfa1f4a0aee2faf8d2bef18049267179da6f7eafe761cae4e954722361e2a0bacc749
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 9c3c5eeab82227e6bb43af1b64cc0dcdd7d27133d6319cdb31500649e8173379.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CSRLT.EXE = "C:\\Windows\\system32\\CSRLT.EXE" 9c3c5eeab82227e6bb43af1b64cc0dcdd7d27133d6319cdb31500649e8173379.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9c3c5eeab82227e6bb43af1b64cc0dcdd7d27133d6319cdb31500649e8173379.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\MSBLT.EXE = "C:\\Windows\\MSBLT.EXE" 9c3c5eeab82227e6bb43af1b64cc0dcdd7d27133d6319cdb31500649e8173379.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\CSRLT.EXE 9c3c5eeab82227e6bb43af1b64cc0dcdd7d27133d6319cdb31500649e8173379.exe File opened for modification C:\Windows\SysWOW64\CSRLT.EXE 9c3c5eeab82227e6bb43af1b64cc0dcdd7d27133d6319cdb31500649e8173379.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\MSBLT.EXE 9c3c5eeab82227e6bb43af1b64cc0dcdd7d27133d6319cdb31500649e8173379.exe File opened for modification C:\Windows\MSBLT.EXE 9c3c5eeab82227e6bb43af1b64cc0dcdd7d27133d6319cdb31500649e8173379.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c3c5eeab82227e6bb43af1b64cc0dcdd7d27133d6319cdb31500649e8173379.exe"C:\Users\Admin\AppData\Local\Temp\9c3c5eeab82227e6bb43af1b64cc0dcdd7d27133d6319cdb31500649e8173379.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
PID:968