Analysis
-
max time kernel
151s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 06:27
Behavioral task
behavioral1
Sample
5993c15c990cd83a710fd7d3ee002cc2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5993c15c990cd83a710fd7d3ee002cc2.exe
Resource
win10v2004-20231215-en
General
-
Target
5993c15c990cd83a710fd7d3ee002cc2.exe
-
Size
410KB
-
MD5
5993c15c990cd83a710fd7d3ee002cc2
-
SHA1
1640b39c1e34e83f6f3245a7982336633067c3a2
-
SHA256
c6412c3920a5e5e958e9a73d4da2e0593a7fee9d95a4afc4a0385110c5d0c3c7
-
SHA512
75ee36f9fc531ce83149cd6ac90f810b4506be75329aea8379d67a267327ab7d39a712f29a44d3f7798fb44efeea4aad65fe0f3ef03b34d6731c682c1c4263c7
-
SSDEEP
6144:zknN4CVUIm6uk06ZLYgvBA+8xmrxgmA+3cclptVopA/c0/uAIehqEqxBJBBgDjML:gnNhuBoY8SorxgmA+nlvVl/c0j8nBqML
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe csrcs.exe" 5993c15c990cd83a710fd7d3ee002cc2.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 5993c15c990cd83a710fd7d3ee002cc2.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 5993c15c990cd83a710fd7d3ee002cc2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\csrcs = "C:\\Windows\\system32\\csrcs.exe" 5993c15c990cd83a710fd7d3ee002cc2.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation 5993c15c990cd83a710fd7d3ee002cc2.exe -
Executes dropped EXE 1 IoCs
pid Process 4332 csrcs.exe -
resource yara_rule behavioral2/memory/3208-0-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/files/0x00030000000226fd-13.dat upx behavioral2/files/0x00030000000226fd-69.dat upx behavioral2/memory/4332-81-0x0000000000400000-0x0000000000492000-memory.dmp upx behavioral2/memory/3208-85-0x0000000000400000-0x0000000000492000-memory.dmp upx -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4332-81-0x0000000000400000-0x0000000000492000-memory.dmp autoit_exe behavioral2/memory/3208-85-0x0000000000400000-0x0000000000492000-memory.dmp autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\csrcs.exe 5993c15c990cd83a710fd7d3ee002cc2.exe File opened for modification C:\Windows\SysWOW64\csrcs.exe 5993c15c990cd83a710fd7d3ee002cc2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 5993c15c990cd83a710fd7d3ee002cc2.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4964 PING.EXE 628 PING.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3208 5993c15c990cd83a710fd7d3ee002cc2.exe 3208 5993c15c990cd83a710fd7d3ee002cc2.exe 3208 5993c15c990cd83a710fd7d3ee002cc2.exe 3208 5993c15c990cd83a710fd7d3ee002cc2.exe 3208 5993c15c990cd83a710fd7d3ee002cc2.exe 3208 5993c15c990cd83a710fd7d3ee002cc2.exe 4332 csrcs.exe 4332 csrcs.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3208 wrote to memory of 4332 3208 5993c15c990cd83a710fd7d3ee002cc2.exe 91 PID 3208 wrote to memory of 4332 3208 5993c15c990cd83a710fd7d3ee002cc2.exe 91 PID 3208 wrote to memory of 4332 3208 5993c15c990cd83a710fd7d3ee002cc2.exe 91 PID 4332 wrote to memory of 4188 4332 csrcs.exe 94 PID 4332 wrote to memory of 4188 4332 csrcs.exe 94 PID 4332 wrote to memory of 4188 4332 csrcs.exe 94 PID 4188 wrote to memory of 4964 4188 cmd.exe 95 PID 4188 wrote to memory of 4964 4188 cmd.exe 95 PID 4188 wrote to memory of 4964 4188 cmd.exe 95 PID 3208 wrote to memory of 3496 3208 5993c15c990cd83a710fd7d3ee002cc2.exe 98 PID 3208 wrote to memory of 3496 3208 5993c15c990cd83a710fd7d3ee002cc2.exe 98 PID 3208 wrote to memory of 3496 3208 5993c15c990cd83a710fd7d3ee002cc2.exe 98 PID 3496 wrote to memory of 628 3496 cmd.exe 97 PID 3496 wrote to memory of 628 3496 cmd.exe 97 PID 3496 wrote to memory of 628 3496 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\5993c15c990cd83a710fd7d3ee002cc2.exe"C:\Users\Admin\AppData\Local\Temp\5993c15c990cd83a710fd7d3ee002cc2.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\csrcs.exe"C:\Windows\System32\csrcs.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\suicide.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\PING.EXEping -n 5 -w 250 127.0.0.14⤵
- Runs ping.exe
PID:4964
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\suicide.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3496
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 -w 250 127.0.0.11⤵
- Runs ping.exe
PID:628
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD52a3ed75f63103f7ca4343207c95d8b13
SHA127f73f1ab7f81fbbaa6c31535a5cfaa20687efd8
SHA2560dd8aba17ab8c1b7bed2560fc5ad1045b468ae5b9a52656e88b2c7113c06fa46
SHA512c9b1c7c6cb33ea922fea77baa4539e4e530a31137536b86a31c6dfc751167c8ec1a681103892134a84514c9d8e86133933ab08f309e96acc19bdc8d8070a3287
-
Filesize
141B
MD59d7ddbc6c331aefed77908f803fca1e5
SHA1d36afa796236730342b216f083c68a39227c13bf
SHA25619f0453504f36aef7d207f11345ed203440a3a8dd1594df1aa072b2f4eeb39bf
SHA512014c7cb15ec0bfc96e1f5b5a66b0bba9b87440256d0e8d9106cef8c4d2f1d244a3063a7abb847957310b2e0c9db466291851d7bb2ff8e6b50e0b9ad907b9b54c
-
Filesize
223B
MD5fc54653aa38bf4638767e1d626b68136
SHA1ec27d540f3575a91cc7b72e790f2a75df101cf18
SHA2564d2732e04831aa21b924b8cfedf09f0b6ac11e07061cf352c3e5616bf6af014b
SHA512ad05594852a0e41006e5646495e5918f826260ac1f84c7ecf9cb1b1bda984596666c8d02edd6f8d6ed967560ac4a1058bea9c360b49b7873b6566dcf2519e3bc
-
Filesize
68KB
MD5f32ac35186696431d8cb03dcf720031c
SHA17d80a6bca38edb5b09db17f7103143d81de217ee
SHA2566cc2e5c46f35339381bd60df6eb2549c32943c84415ec40fc4f7745e7494c495
SHA512095f7956c5235512ce0b1f1b2cf6f6e2868aa656b57ea49cc2ca50f9bcde6a97d1df098cc391a73d58cfa877fd7363ff93613c848fdc4468262f5a1bc33a6a8b
-
Filesize
410KB
MD55993c15c990cd83a710fd7d3ee002cc2
SHA11640b39c1e34e83f6f3245a7982336633067c3a2
SHA256c6412c3920a5e5e958e9a73d4da2e0593a7fee9d95a4afc4a0385110c5d0c3c7
SHA51275ee36f9fc531ce83149cd6ac90f810b4506be75329aea8379d67a267327ab7d39a712f29a44d3f7798fb44efeea4aad65fe0f3ef03b34d6731c682c1c4263c7