Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-10-2022 23:26
Static task
static1
Behavioral task
behavioral1
Sample
3e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10.exe
Resource
win10v2004-20220812-en
General
-
Target
3e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10.exe
-
Size
93KB
-
MD5
044632b9a50c97acc9e74d3f5e1eb801
-
SHA1
e560d1275ea235741ef43628bbca7950316024fe
-
SHA256
3e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10
-
SHA512
4b1c022bb377d218a2a6f88e3e770b276d31685c61d2c95070bbfbe74963b64fd35d7bc6b22465ff8e5e2ce0f151b5db9d7f6352604ea0b2719567ae13606f9f
-
SSDEEP
1536:3tXEgfR+dxrrAPvCFghMO8zCThiztILprD1KdV:3tUgJoP6Cc8zEiztO16
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1772 csrss.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1772 set thread context of 1908 1772 csrss.exe 29 PID 1772 set thread context of 0 1772 csrss.exe PID 1772 set thread context of 0 1772 csrss.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\csrss.exe 3e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSystemtimePrivilege 1980 3e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10.exe Token: SeSystemtimePrivilege 1980 3e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1772 1980 3e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10.exe 28 PID 1980 wrote to memory of 1772 1980 3e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10.exe 28 PID 1980 wrote to memory of 1772 1980 3e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10.exe 28 PID 1980 wrote to memory of 1772 1980 3e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10.exe 28 PID 1772 wrote to memory of 1908 1772 csrss.exe 29 PID 1772 wrote to memory of 1908 1772 csrss.exe 29 PID 1772 wrote to memory of 1908 1772 csrss.exe 29 PID 1772 wrote to memory of 1908 1772 csrss.exe 29 PID 1772 wrote to memory of 1908 1772 csrss.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10.exe"C:\Users\Admin\AppData\Local\Temp\3e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\csrss.exe"C:\Windows\csrss.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\svchost.exesvchost C:\Windows\csrss.exe3⤵PID:1908
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5044632b9a50c97acc9e74d3f5e1eb801
SHA1e560d1275ea235741ef43628bbca7950316024fe
SHA2563e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10
SHA5124b1c022bb377d218a2a6f88e3e770b276d31685c61d2c95070bbfbe74963b64fd35d7bc6b22465ff8e5e2ce0f151b5db9d7f6352604ea0b2719567ae13606f9f
-
Filesize
93KB
MD5044632b9a50c97acc9e74d3f5e1eb801
SHA1e560d1275ea235741ef43628bbca7950316024fe
SHA2563e4c7a58f43df5c4d178c906c0aa7af8f7313dd244bc844947989df4b3ff4e10
SHA5124b1c022bb377d218a2a6f88e3e770b276d31685c61d2c95070bbfbe74963b64fd35d7bc6b22465ff8e5e2ce0f151b5db9d7f6352604ea0b2719567ae13606f9f