Analysis
-
max time kernel
159s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/10/2022, 19:30
Static task
static1
Behavioral task
behavioral1
Sample
e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe
Resource
win10v2004-20220812-en
General
-
Target
e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe
-
Size
360KB
-
MD5
02f6204106d70dd0b1cf5db2e6cdd502
-
SHA1
ac677f22d48d65eb30100ad742c1cceb04bc283a
-
SHA256
e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110
-
SHA512
07fccb55c27e2d09fb1ad7f95f615d336bfc90cabf13ff2052f044cb01a9209ba9e568e2c64740023a3639cc649a5d433e0e7e13c8ca55e04a4eb76c7e7339c6
-
SSDEEP
3072:Ac35+4OE3grQW5Z+PchxxXWrI3NWggxXfiOXdQbMsjr9fP8y:J5+4FDfrFk
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\"" e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\"" csrss.exe -
Executes dropped EXE 2 IoCs
pid Process 1164 csrss.exe 1320 csrss.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1092 netsh.exe -
resource yara_rule behavioral1/memory/1324-57-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1324-60-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1324-61-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1324-64-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1324-67-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1324-74-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1320-87-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1320-89-0x0000000000400000-0x0000000000425000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1324 e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe 1324 e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\"" e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\"" csrss.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\"" csrss.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\"" e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1388 set thread context of 1324 1388 e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe 26 PID 1164 set thread context of 1320 1164 csrss.exe 32 -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1388 e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe 1324 e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe 1164 csrss.exe 1320 csrss.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1388 wrote to memory of 1324 1388 e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe 26 PID 1388 wrote to memory of 1324 1388 e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe 26 PID 1388 wrote to memory of 1324 1388 e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe 26 PID 1388 wrote to memory of 1324 1388 e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe 26 PID 1388 wrote to memory of 1324 1388 e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe 26 PID 1388 wrote to memory of 1324 1388 e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe 26 PID 1388 wrote to memory of 1324 1388 e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe 26 PID 1388 wrote to memory of 1324 1388 e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe 26 PID 1388 wrote to memory of 1324 1388 e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe 26 PID 1324 wrote to memory of 1092 1324 e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe 29 PID 1324 wrote to memory of 1092 1324 e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe 29 PID 1324 wrote to memory of 1092 1324 e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe 29 PID 1324 wrote to memory of 1092 1324 e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe 29 PID 1324 wrote to memory of 1164 1324 e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe 31 PID 1324 wrote to memory of 1164 1324 e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe 31 PID 1324 wrote to memory of 1164 1324 e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe 31 PID 1324 wrote to memory of 1164 1324 e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe 31 PID 1164 wrote to memory of 1320 1164 csrss.exe 32 PID 1164 wrote to memory of 1320 1164 csrss.exe 32 PID 1164 wrote to memory of 1320 1164 csrss.exe 32 PID 1164 wrote to memory of 1320 1164 csrss.exe 32 PID 1164 wrote to memory of 1320 1164 csrss.exe 32 PID 1164 wrote to memory of 1320 1164 csrss.exe 32 PID 1164 wrote to memory of 1320 1164 csrss.exe 32 PID 1164 wrote to memory of 1320 1164 csrss.exe 32 PID 1164 wrote to memory of 1320 1164 csrss.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe"C:\Users\Admin\AppData\Local\Temp\e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe"C:\Users\Admin\AppData\Local\Temp\e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe"2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\csrss.exe" CityScape Enable3⤵
- Modifies Windows Firewall
PID:1092
-
-
C:\Users\Admin\AppData\Roaming\csrss.exe/d C:\Users\Admin\AppData\Local\Temp\e350e7b3938a0ecab11e5ee072d1732789b867aa8c362c5c385a509fa9503110.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Roaming\csrss.exe"C:\Users\Admin\AppData\Roaming\csrss.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1320
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
360KB
MD56519adcd5136d04bc8444be019f90cb1
SHA10031e09b607f8e92c66c515862ca75a8056ed67e
SHA256d25d5617edb0e420084a96f7cac347cf766198b437f3d83150780e2ccf503b67
SHA512d50e17acfae8c402844b668f65d986d044caf9155e93dd824c0f70539090749e4f257708e36558e592485d4110276405d14ffb929ef4b466f2fe66c28b4fccf7
-
Filesize
360KB
MD56519adcd5136d04bc8444be019f90cb1
SHA10031e09b607f8e92c66c515862ca75a8056ed67e
SHA256d25d5617edb0e420084a96f7cac347cf766198b437f3d83150780e2ccf503b67
SHA512d50e17acfae8c402844b668f65d986d044caf9155e93dd824c0f70539090749e4f257708e36558e592485d4110276405d14ffb929ef4b466f2fe66c28b4fccf7
-
Filesize
360KB
MD56519adcd5136d04bc8444be019f90cb1
SHA10031e09b607f8e92c66c515862ca75a8056ed67e
SHA256d25d5617edb0e420084a96f7cac347cf766198b437f3d83150780e2ccf503b67
SHA512d50e17acfae8c402844b668f65d986d044caf9155e93dd824c0f70539090749e4f257708e36558e592485d4110276405d14ffb929ef4b466f2fe66c28b4fccf7
-
Filesize
360KB
MD56519adcd5136d04bc8444be019f90cb1
SHA10031e09b607f8e92c66c515862ca75a8056ed67e
SHA256d25d5617edb0e420084a96f7cac347cf766198b437f3d83150780e2ccf503b67
SHA512d50e17acfae8c402844b668f65d986d044caf9155e93dd824c0f70539090749e4f257708e36558e592485d4110276405d14ffb929ef4b466f2fe66c28b4fccf7
-
Filesize
360KB
MD56519adcd5136d04bc8444be019f90cb1
SHA10031e09b607f8e92c66c515862ca75a8056ed67e
SHA256d25d5617edb0e420084a96f7cac347cf766198b437f3d83150780e2ccf503b67
SHA512d50e17acfae8c402844b668f65d986d044caf9155e93dd824c0f70539090749e4f257708e36558e592485d4110276405d14ffb929ef4b466f2fe66c28b4fccf7