Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 07:49
Static task
static1
Behavioral task
behavioral1
Sample
1006f3655838b8b52a03fa21cba87a4e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1006f3655838b8b52a03fa21cba87a4e.exe
Resource
win10v2004-20231215-en
General
-
Target
1006f3655838b8b52a03fa21cba87a4e.exe
-
Size
20KB
-
MD5
1006f3655838b8b52a03fa21cba87a4e
-
SHA1
027e942d5de031a4a1f52286020db2c19d3f0379
-
SHA256
40a18edab89c91c6c457a1c9dd33c3ca3ab97d755ce9af132bfdfd1f2d55c390
-
SHA512
fb51f4e3cec8d01ab8c373e0e3eb105eb92914a964f51bdac0c741b139fb83b32cbe14548b007a83eb22c6b62e2e46fb61b621781cf176983fc661fea189f767
-
SSDEEP
192:YAiVgBcnIILbU1dWLiXjCxPLsuirxMCgcL6ApyoaivfwM:YjVMIH0dWGOmt52hot
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2036 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2384 csrcs.exe -
Loads dropped DLL 2 IoCs
pid Process 2036 svchost.exe 2036 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrcs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\csrcs.exe" svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1708 set thread context of 2036 1708 1006f3655838b8b52a03fa21cba87a4e.exe 28 PID 2384 set thread context of 2976 2384 csrcs.exe 30 -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2036 1708 1006f3655838b8b52a03fa21cba87a4e.exe 28 PID 1708 wrote to memory of 2036 1708 1006f3655838b8b52a03fa21cba87a4e.exe 28 PID 1708 wrote to memory of 2036 1708 1006f3655838b8b52a03fa21cba87a4e.exe 28 PID 1708 wrote to memory of 2036 1708 1006f3655838b8b52a03fa21cba87a4e.exe 28 PID 1708 wrote to memory of 2036 1708 1006f3655838b8b52a03fa21cba87a4e.exe 28 PID 1708 wrote to memory of 2036 1708 1006f3655838b8b52a03fa21cba87a4e.exe 28 PID 1708 wrote to memory of 2036 1708 1006f3655838b8b52a03fa21cba87a4e.exe 28 PID 1708 wrote to memory of 2036 1708 1006f3655838b8b52a03fa21cba87a4e.exe 28 PID 2036 wrote to memory of 2384 2036 svchost.exe 29 PID 2036 wrote to memory of 2384 2036 svchost.exe 29 PID 2036 wrote to memory of 2384 2036 svchost.exe 29 PID 2036 wrote to memory of 2384 2036 svchost.exe 29 PID 2384 wrote to memory of 2976 2384 csrcs.exe 30 PID 2384 wrote to memory of 2976 2384 csrcs.exe 30 PID 2384 wrote to memory of 2976 2384 csrcs.exe 30 PID 2384 wrote to memory of 2976 2384 csrcs.exe 30 PID 2384 wrote to memory of 2976 2384 csrcs.exe 30 PID 2384 wrote to memory of 2976 2384 csrcs.exe 30 PID 2384 wrote to memory of 2976 2384 csrcs.exe 30 PID 2384 wrote to memory of 2976 2384 csrcs.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1006f3655838b8b52a03fa21cba87a4e.exe"C:\Users\Admin\AppData\Local\Temp\1006f3655838b8b52a03fa21cba87a4e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Deletes itself
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\csrcs.exe"C:\Users\Admin\AppData\Local\Temp\csrcs.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵PID:2976
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD51006f3655838b8b52a03fa21cba87a4e
SHA1027e942d5de031a4a1f52286020db2c19d3f0379
SHA25640a18edab89c91c6c457a1c9dd33c3ca3ab97d755ce9af132bfdfd1f2d55c390
SHA512fb51f4e3cec8d01ab8c373e0e3eb105eb92914a964f51bdac0c741b139fb83b32cbe14548b007a83eb22c6b62e2e46fb61b621781cf176983fc661fea189f767