Analysis
-
max time kernel
3s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27-12-2023 03:19
Static task
static1
Behavioral task
behavioral1
Sample
a04598775fae6b5adc9a95381961f18c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a04598775fae6b5adc9a95381961f18c.exe
Resource
win10v2004-20231222-en
General
-
Target
a04598775fae6b5adc9a95381961f18c.exe
-
Size
88KB
-
MD5
a04598775fae6b5adc9a95381961f18c
-
SHA1
80391427a2f16c4e05fbda58d8b6a92dcf3e0e46
-
SHA256
fc58af62e63a634abbe88f3d777792185ef184129569a6a029ead976e34acbfa
-
SHA512
b29cafd7e380c23efd95f99e54b6d94819eda10ed50fa5d60e1b71322854ac6a628321574212714b7369f7e5c908a6b47a7bcc32f501944faa66fca1e1692bd5
-
SSDEEP
1536:tQzq7KAAwJENVy7yCe3j77GgP6UmGGJXkBKuZgQc:toAK3wqNUmb3jGgPZc4XZgQc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
crss.exepid process 2856 crss.exe -
Loads dropped DLL 2 IoCs
Processes:
a04598775fae6b5adc9a95381961f18c.exepid process 344 a04598775fae6b5adc9a95381961f18c.exe 344 a04598775fae6b5adc9a95381961f18c.exe -
Processes:
resource yara_rule behavioral1/memory/2640-7-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2640-9-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2640-13-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2640-19-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2640-22-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2640-16-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2864-71-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2640-96-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2864-97-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2864-100-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2864-111-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
a04598775fae6b5adc9a95381961f18c.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\Download Manager2 = "C:\\Users\\Admin\\Downloads\\crss.exe" a04598775fae6b5adc9a95381961f18c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\Profile Manager2 = "C:\\Users\\Admin\\crss.exe" a04598775fae6b5adc9a95381961f18c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\Document Explorer2 = "C:\\Users\\Admin\\Documents\\crss.exe" a04598775fae6b5adc9a95381961f18c.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
a04598775fae6b5adc9a95381961f18c.exedescription pid process target process PID 2228 set thread context of 2640 2228 a04598775fae6b5adc9a95381961f18c.exe a04598775fae6b5adc9a95381961f18c.exe PID 2228 set thread context of 344 2228 a04598775fae6b5adc9a95381961f18c.exe a04598775fae6b5adc9a95381961f18c.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeipconfig.exepid process 2600 ipconfig.exe 2688 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a04598775fae6b5adc9a95381961f18c.exepid process 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
a04598775fae6b5adc9a95381961f18c.exea04598775fae6b5adc9a95381961f18c.execrss.exepid process 2228 a04598775fae6b5adc9a95381961f18c.exe 2640 a04598775fae6b5adc9a95381961f18c.exe 2856 crss.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
a04598775fae6b5adc9a95381961f18c.exea04598775fae6b5adc9a95381961f18c.exea04598775fae6b5adc9a95381961f18c.exedescription pid process target process PID 2228 wrote to memory of 2640 2228 a04598775fae6b5adc9a95381961f18c.exe a04598775fae6b5adc9a95381961f18c.exe PID 2228 wrote to memory of 2640 2228 a04598775fae6b5adc9a95381961f18c.exe a04598775fae6b5adc9a95381961f18c.exe PID 2228 wrote to memory of 2640 2228 a04598775fae6b5adc9a95381961f18c.exe a04598775fae6b5adc9a95381961f18c.exe PID 2228 wrote to memory of 2640 2228 a04598775fae6b5adc9a95381961f18c.exe a04598775fae6b5adc9a95381961f18c.exe PID 2228 wrote to memory of 2640 2228 a04598775fae6b5adc9a95381961f18c.exe a04598775fae6b5adc9a95381961f18c.exe PID 2228 wrote to memory of 2640 2228 a04598775fae6b5adc9a95381961f18c.exe a04598775fae6b5adc9a95381961f18c.exe PID 2228 wrote to memory of 2640 2228 a04598775fae6b5adc9a95381961f18c.exe a04598775fae6b5adc9a95381961f18c.exe PID 2228 wrote to memory of 2640 2228 a04598775fae6b5adc9a95381961f18c.exe a04598775fae6b5adc9a95381961f18c.exe PID 2228 wrote to memory of 344 2228 a04598775fae6b5adc9a95381961f18c.exe a04598775fae6b5adc9a95381961f18c.exe PID 2228 wrote to memory of 344 2228 a04598775fae6b5adc9a95381961f18c.exe a04598775fae6b5adc9a95381961f18c.exe PID 2228 wrote to memory of 344 2228 a04598775fae6b5adc9a95381961f18c.exe a04598775fae6b5adc9a95381961f18c.exe PID 2228 wrote to memory of 344 2228 a04598775fae6b5adc9a95381961f18c.exe a04598775fae6b5adc9a95381961f18c.exe PID 2228 wrote to memory of 344 2228 a04598775fae6b5adc9a95381961f18c.exe a04598775fae6b5adc9a95381961f18c.exe PID 2228 wrote to memory of 344 2228 a04598775fae6b5adc9a95381961f18c.exe a04598775fae6b5adc9a95381961f18c.exe PID 2228 wrote to memory of 344 2228 a04598775fae6b5adc9a95381961f18c.exe a04598775fae6b5adc9a95381961f18c.exe PID 2228 wrote to memory of 344 2228 a04598775fae6b5adc9a95381961f18c.exe a04598775fae6b5adc9a95381961f18c.exe PID 2228 wrote to memory of 344 2228 a04598775fae6b5adc9a95381961f18c.exe a04598775fae6b5adc9a95381961f18c.exe PID 2228 wrote to memory of 344 2228 a04598775fae6b5adc9a95381961f18c.exe a04598775fae6b5adc9a95381961f18c.exe PID 344 wrote to memory of 2856 344 a04598775fae6b5adc9a95381961f18c.exe crss.exe PID 344 wrote to memory of 2856 344 a04598775fae6b5adc9a95381961f18c.exe crss.exe PID 344 wrote to memory of 2856 344 a04598775fae6b5adc9a95381961f18c.exe crss.exe PID 344 wrote to memory of 2856 344 a04598775fae6b5adc9a95381961f18c.exe crss.exe PID 2640 wrote to memory of 2688 2640 a04598775fae6b5adc9a95381961f18c.exe ipconfig.exe PID 2640 wrote to memory of 2688 2640 a04598775fae6b5adc9a95381961f18c.exe ipconfig.exe PID 2640 wrote to memory of 2688 2640 a04598775fae6b5adc9a95381961f18c.exe ipconfig.exe PID 2640 wrote to memory of 2688 2640 a04598775fae6b5adc9a95381961f18c.exe ipconfig.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a04598775fae6b5adc9a95381961f18c.exe"C:\Users\Admin\AppData\Local\Temp\a04598775fae6b5adc9a95381961f18c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\a04598775fae6b5adc9a95381961f18c.exe"C:\Users\Admin\AppData\Local\Temp\a04598775fae6b5adc9a95381961f18c.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew3⤵
- Gathers network information
PID:2688
-
-
-
C:\Users\Admin\AppData\Local\Temp\a04598775fae6b5adc9a95381961f18c.exe"C:\Users\Admin\AppData\Local\Temp\a04598775fae6b5adc9a95381961f18c.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Users\Admin\crss.exe"C:\Users\Admin\crss.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2856 -
C:\Users\Admin\crss.exe"C:\Users\Admin\crss.exe"4⤵PID:2864
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew5⤵
- Gathers network information
PID:2600
-
-
-
C:\Users\Admin\crss.exe"C:\Users\Admin\crss.exe"4⤵PID:2872
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5a04598775fae6b5adc9a95381961f18c
SHA180391427a2f16c4e05fbda58d8b6a92dcf3e0e46
SHA256fc58af62e63a634abbe88f3d777792185ef184129569a6a029ead976e34acbfa
SHA512b29cafd7e380c23efd95f99e54b6d94819eda10ed50fa5d60e1b71322854ac6a628321574212714b7369f7e5c908a6b47a7bcc32f501944faa66fca1e1692bd5