Analysis
-
max time kernel
181s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-05-2022 00:57
Behavioral task
behavioral1
Sample
e896e2a08ba8d53ae2f3d5b98b853a3daecb63431de52171b8e492fddd0c7c92.exe
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
e896e2a08ba8d53ae2f3d5b98b853a3daecb63431de52171b8e492fddd0c7c92.exe
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
e896e2a08ba8d53ae2f3d5b98b853a3daecb63431de52171b8e492fddd0c7c92.exe
-
Size
27.8MB
-
MD5
009c9dca4476201b05080ca09ea29c5a
-
SHA1
e3bef5c680c0a3919199b8a7487e4b3d642aa8cd
-
SHA256
e896e2a08ba8d53ae2f3d5b98b853a3daecb63431de52171b8e492fddd0c7c92
-
SHA512
7e9bfdda7461dd5821ca94c077396163739057c742e60ae4ff07971594fc415af5f627d7dc6cb7329fef79969f3b29228c6113d53bd94b5d436fedfd9d9437d2
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run e896e2a08ba8d53ae2f3d5b98b853a3daecb63431de52171b8e492fddd0c7c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CSRLT.EXE = "C:\\Windows\\system32\\CSRLT.EXE" e896e2a08ba8d53ae2f3d5b98b853a3daecb63431de52171b8e492fddd0c7c92.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e896e2a08ba8d53ae2f3d5b98b853a3daecb63431de52171b8e492fddd0c7c92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\MSBLT.EXE = "C:\\Windows\\MSBLT.EXE" e896e2a08ba8d53ae2f3d5b98b853a3daecb63431de52171b8e492fddd0c7c92.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\CSRLT.EXE e896e2a08ba8d53ae2f3d5b98b853a3daecb63431de52171b8e492fddd0c7c92.exe File opened for modification C:\Windows\SysWOW64\CSRLT.EXE e896e2a08ba8d53ae2f3d5b98b853a3daecb63431de52171b8e492fddd0c7c92.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\MSBLT.EXE e896e2a08ba8d53ae2f3d5b98b853a3daecb63431de52171b8e492fddd0c7c92.exe File opened for modification C:\Windows\MSBLT.EXE e896e2a08ba8d53ae2f3d5b98b853a3daecb63431de52171b8e492fddd0c7c92.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e896e2a08ba8d53ae2f3d5b98b853a3daecb63431de52171b8e492fddd0c7c92.exe"C:\Users\Admin\AppData\Local\Temp\e896e2a08ba8d53ae2f3d5b98b853a3daecb63431de52171b8e492fddd0c7c92.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
PID:1340