Analysis
-
max time kernel
147s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 07:08
Static task
static1
Behavioral task
behavioral1
Sample
5b906587a5be3427f67fbebf8c52743a.exe
Resource
win7-20231215-en
General
-
Target
5b906587a5be3427f67fbebf8c52743a.exe
-
Size
767KB
-
MD5
5b906587a5be3427f67fbebf8c52743a
-
SHA1
e0b09a152493c18a19442847189eb05652318654
-
SHA256
856e717d098a404466029967ca61644b48495599464d98a9b9b93ef5013fda9d
-
SHA512
5f9d47bee9f25b0dd3aa632d49b043acd5ad922b586daacbe9aaab5d5945b0acc9bcc0d0991ee2c5c4fe95a983c5f376079c579b39c3644c14d45c689d91e89f
-
SSDEEP
12288:IWDLGQ5voSnS2cKiU/kXXZEDQBFmNO1leA4LuUyr/wuZyc200rkWiyayfak2+g:BLGQ5vlnSCiUsnZcQFe5JyrYqEqrfP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 5b906587a5be3427f67fbebf8c52743a.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation csrss.exe -
Executes dropped EXE 2 IoCs
pid Process 2540 csrss.exe 4420 hex.exe -
resource yara_rule behavioral2/memory/2540-41-0x0000000000400000-0x00000000005C6000-memory.dmp upx behavioral2/files/0x0006000000023219-39.dat upx behavioral2/files/0x0006000000023219-38.dat upx behavioral2/memory/2540-360-0x0000000000400000-0x00000000005C6000-memory.dmp upx behavioral2/memory/2540-364-0x0000000000400000-0x00000000005C6000-memory.dmp upx behavioral2/memory/2540-371-0x0000000000400000-0x00000000005C6000-memory.dmp upx behavioral2/memory/2540-375-0x0000000000400000-0x00000000005C6000-memory.dmp upx behavioral2/memory/2540-382-0x0000000000400000-0x00000000005C6000-memory.dmp upx behavioral2/memory/2540-386-0x0000000000400000-0x00000000005C6000-memory.dmp upx behavioral2/memory/2540-390-0x0000000000400000-0x00000000005C6000-memory.dmp upx behavioral2/memory/2540-397-0x0000000000400000-0x00000000005C6000-memory.dmp upx behavioral2/memory/2540-402-0x0000000000400000-0x00000000005C6000-memory.dmp upx behavioral2/memory/2540-409-0x0000000000400000-0x00000000005C6000-memory.dmp upx behavioral2/memory/2540-413-0x0000000000400000-0x00000000005C6000-memory.dmp upx behavioral2/memory/2540-416-0x0000000000400000-0x00000000005C6000-memory.dmp upx behavioral2/memory/2540-424-0x0000000000400000-0x00000000005C6000-memory.dmp upx behavioral2/memory/2540-428-0x0000000000400000-0x00000000005C6000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\RECYCLER\S-1-5-21-3252328098-71414409-2463015037-501\desktop.ini 5b906587a5be3427f67fbebf8c52743a.exe File opened for modification C:\RECYCLER\S-1-5-21-3252328098-71414409-2463015037-501\desktop.ini 5b906587a5be3427f67fbebf8c52743a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\Topic\ = "Connect" csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\EditFlags = 02000000 csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cha\ = "ChatFile" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\Application\ = "mIRC" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\command csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\command\ = "\"C:\\RECYCLER\\S-1-5-21-3252328098-71414409-2463015037-501\\csrss.exe\" -noconnect" csrss.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\ddeexec\Application csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cha csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.chat\ = "ChatFile" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\command\ = "\"C:\\RECYCLER\\S-1-5-21-3252328098-71414409-2463015037-501\\csrss.exe\" -noconnect" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\ddeexec\ = "%1" csrss.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\ddeexec\ifexec csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\ifexec\ = "%1" csrss.exe Key created \REGISTRY\MACHINE\Software\Classes\irc csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\DefaultIcon\ = "\"C:\\RECYCLER\\S-1-5-21-3252328098-71414409-2463015037-501\\csrss.exe\"" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\ = "%1" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\irc csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\Topic csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\ = "URL:IRC Protocol" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\ddeexec\ifexec\ = "%1" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\ddeexec\Topic\ = "Connect" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.chat csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\ = "Chat File" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\DefaultIcon csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\command csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\Application csrss.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\DefaultIcon csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open csrss.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\ddeexec csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\ddeexec\Application\ = "mIRC" csrss.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\ddeexec\Topic csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\DefaultIcon\ = "\"C:\\RECYCLER\\S-1-5-21-3252328098-71414409-2463015037-501\\csrss.exe\"" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\ifexec csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\URL Protocol csrss.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\command csrss.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2540 csrss.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2540 csrss.exe 2540 csrss.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4856 wrote to memory of 2540 4856 5b906587a5be3427f67fbebf8c52743a.exe 26 PID 4856 wrote to memory of 2540 4856 5b906587a5be3427f67fbebf8c52743a.exe 26 PID 4856 wrote to memory of 2540 4856 5b906587a5be3427f67fbebf8c52743a.exe 26 PID 2540 wrote to memory of 4420 2540 csrss.exe 24 PID 2540 wrote to memory of 4420 2540 csrss.exe 24 PID 2540 wrote to memory of 4420 2540 csrss.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b906587a5be3427f67fbebf8c52743a.exe"C:\Users\Admin\AppData\Local\Temp\5b906587a5be3427f67fbebf8c52743a.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\RECYCLER\S-1-5-21-3252328098-71414409-2463015037-501\csrss.exe"C:\RECYCLER\S-1-5-21-3252328098-71414409-2463015037-501\csrss.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540
-
-
C:\RECYCLER\S-1-5-21-3252328098-71414409-2463015037-501\hex.exe"C:\RECYCLER\S-1-5-21-3252328098-71414409-2463015037-501\hex.exe" "mIRC DB" /hide1⤵
- Executes dropped EXE
PID:4420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD5fa7844b2d33b7de2a43aaaab7b45a8d6
SHA1e6b0382314af628c50062c6d06796db7a4c39c5a
SHA256acaf46f5c60ed07be6c1ce793fe2d4e3186e67cf33408443ab5195caa1ebfd6e
SHA512722ea7ae8af9b7dcb7ae77248bc523f91f5f7a06670c0e08c649286315e98964c3e70bc50283d09528b7fee9d4316c76b4e1d170632807f47740ad989661948f
-
Filesize
385KB
MD53a2414627862990a76549396c1ce38b4
SHA18e239a9861a051edba86655eb23c795e6f36a229
SHA2568979f3f9344d04657a18d2c3dfd1061b0531691dd34f7b37d11bedb030bc5ec7
SHA512679a6ae147f2cafff9459b7a8e479320d617784bfffe21421f2dd6e666c4fd2f2722c897714d5197e2999d1b317999d0cc25719b0a39a53efbbbe6979050f11d
-
Filesize
3KB
MD5d5d0e5f644d304d56ae351d63cc59bc9
SHA1987adb5fcb36a28be1440f814592c28b71cf49a6
SHA2561d1c9ba032acec40b3a7ddaeb3fedfc94d2d2599b88279967b72a725e0833a0b
SHA5123dcce470e2bd50eedaf58a48ee2252e7ddca86f0c422a9379bb15ae613215bef87e9815675ddf04ccc944002d17318ffd13225dc0b7aded4f955d348500297cd
-
Filesize
3KB
MD5752b13a1dd169e9187eb4d1c1cf8ef1c
SHA1376ca17e39d2d6c02de9755f5783bae30c2dd4e7
SHA256cca7f582fd39579914a33128e812eca9d62222f0fbb7df4844c49ac62c60f2b2
SHA512aa89e65e343ee13e85311b9de93cc3dcd629e22dac9edd95fa72e8ce6282ca5b168fa4cdee2f7b10282962c9402a4e67398de9940497628e569d5654313502c5
-
Filesize
3KB
MD599a926addb963454a825f4608c6ef9b7
SHA19580376f6de1198048188e1abdf7ff65dcca55cb
SHA256b91ba84088b063955a592a8b2a555db2f9ae54d94c5c23fd8e11920f44798d3d
SHA512daa1b53f7be9534ac8025d9b28a4f358d5ad5692b6c6ca857c3ca2a9789a94ea2979345db18f018f7090570e75a4102297beee1326155dc74a77122b74cae73e
-
Filesize
3KB
MD594409b620e552590722350376a6d7c6f
SHA127671e2ceadd3509e2d62c5e9a2e6348f1f4b559
SHA256c9659d2342a0cfb7a16228b9b5eace37d8034771d1dcdd135a2f2f435820be30
SHA512feba0a176606915b6ac1e8b47e36de3b97aea6ae82af131fa4c0674571d217fbc2efb02654eea532e2f2778f71b76e3a56fdcc0a2abe6c254c01020309518486
-
Filesize
353B
MD50e7428e05c5b7e7e503ab74abd34bca8
SHA1488b4b656ca04ffa43d5947aec434d4355aef3b7
SHA25685aa176c46a06782a8328d37f9a90d39852d5c998c404b57a9c2e9374600244a
SHA5128b160566d196eec86c2211de5d8817def61b2b3e7151f8c1fda3a8b67a2ef768df91f43f861f8c2ce27dc85a7ffb1fe96390da540ef3bad770366ea25fc1ed33