Analysis
-
max time kernel
177s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
11-05-2022 02:56
Behavioral task
behavioral1
Sample
530bd71d2938d6ce76b184091d3553502eb59c12b954c453d3e4e3f7b4eea698.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
530bd71d2938d6ce76b184091d3553502eb59c12b954c453d3e4e3f7b4eea698.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
530bd71d2938d6ce76b184091d3553502eb59c12b954c453d3e4e3f7b4eea698.exe
-
Size
711KB
-
MD5
04c0e38dc52294e87405cd6876c407ce
-
SHA1
eea009875649d8b3b66a8e5049f4b8810aefa86f
-
SHA256
530bd71d2938d6ce76b184091d3553502eb59c12b954c453d3e4e3f7b4eea698
-
SHA512
79754bf9c7415e5a2305cf27229020be48b5e74233c7235aae1924354d8fa81dec4de4f4ca0930fe75723a3a652b9388558397f5d26edd306578aad69275a624
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 530bd71d2938d6ce76b184091d3553502eb59c12b954c453d3e4e3f7b4eea698.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CSRLT.EXE = "C:\\Windows\\system32\\CSRLT.EXE" 530bd71d2938d6ce76b184091d3553502eb59c12b954c453d3e4e3f7b4eea698.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 530bd71d2938d6ce76b184091d3553502eb59c12b954c453d3e4e3f7b4eea698.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\MSBLT.EXE = "C:\\Windows\\MSBLT.EXE" 530bd71d2938d6ce76b184091d3553502eb59c12b954c453d3e4e3f7b4eea698.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\CSRLT.EXE 530bd71d2938d6ce76b184091d3553502eb59c12b954c453d3e4e3f7b4eea698.exe File opened for modification C:\Windows\SysWOW64\CSRLT.EXE 530bd71d2938d6ce76b184091d3553502eb59c12b954c453d3e4e3f7b4eea698.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\MSBLT.EXE 530bd71d2938d6ce76b184091d3553502eb59c12b954c453d3e4e3f7b4eea698.exe File opened for modification C:\Windows\MSBLT.EXE 530bd71d2938d6ce76b184091d3553502eb59c12b954c453d3e4e3f7b4eea698.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\530bd71d2938d6ce76b184091d3553502eb59c12b954c453d3e4e3f7b4eea698.exe"C:\Users\Admin\AppData\Local\Temp\530bd71d2938d6ce76b184091d3553502eb59c12b954c453d3e4e3f7b4eea698.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
PID:4564