Analysis
-
max time kernel
142s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 11:44
Behavioral task
behavioral1
Sample
6bce5addba27609a17ceabef5225970e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6bce5addba27609a17ceabef5225970e.exe
Resource
win10v2004-20231222-en
General
-
Target
6bce5addba27609a17ceabef5225970e.exe
-
Size
42KB
-
MD5
6bce5addba27609a17ceabef5225970e
-
SHA1
66e3add1c262a95eb007a34d2a44bce3d473044f
-
SHA256
c643c6bde2641f7f7cd70e4bf78e9f03329a21fcee2554dc8b31fa25eae81e84
-
SHA512
8a1c68a0b4c0ccd1cb40d89d07d81d29ed222a0b2a9ab4e57467f2baa2ee20051357cf4ade2c9e2b64361a1b03d0ab71b2430c0c35a7ea2a8959267b1e304f56
-
SSDEEP
768:FErskEV4aJPvp5ILsNW7SKVd19Eky6Iu04Fg0Mk2CXgchMtCevOk:FIwtJPTqKWLd1EKFg0ACXOCev9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2196 CSRSS.EXE -
Loads dropped DLL 2 IoCs
pid Process 2236 6bce5addba27609a17ceabef5225970e.exe 2236 6bce5addba27609a17ceabef5225970e.exe -
resource yara_rule behavioral1/memory/2236-0-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/files/0x000c00000001232d-4.dat upx behavioral1/memory/2196-12-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/2236-9-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/2236-8-0x0000000000250000-0x000000000026D000-memory.dmp upx behavioral1/files/0x000c00000001232d-10.dat upx behavioral1/memory/2196-13-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\.svchost = "C:\\Windows\\System\\CSRSS.EXE" 6bce5addba27609a17ceabef5225970e.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\System\CSRSS.EXE 6bce5addba27609a17ceabef5225970e.exe File opened for modification C:\Windows\System\CSRSS.EXE 6bce5addba27609a17ceabef5225970e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2196 2236 6bce5addba27609a17ceabef5225970e.exe 28 PID 2236 wrote to memory of 2196 2236 6bce5addba27609a17ceabef5225970e.exe 28 PID 2236 wrote to memory of 2196 2236 6bce5addba27609a17ceabef5225970e.exe 28 PID 2236 wrote to memory of 2196 2236 6bce5addba27609a17ceabef5225970e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bce5addba27609a17ceabef5225970e.exe"C:\Users\Admin\AppData\Local\Temp\6bce5addba27609a17ceabef5225970e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\System\CSRSS.EXEC:\Windows\System\CSRSS.EXE2⤵
- Executes dropped EXE
PID:2196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD56bce5addba27609a17ceabef5225970e
SHA166e3add1c262a95eb007a34d2a44bce3d473044f
SHA256c643c6bde2641f7f7cd70e4bf78e9f03329a21fcee2554dc8b31fa25eae81e84
SHA5128a1c68a0b4c0ccd1cb40d89d07d81d29ed222a0b2a9ab4e57467f2baa2ee20051357cf4ade2c9e2b64361a1b03d0ab71b2430c0c35a7ea2a8959267b1e304f56