Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28-12-2023 16:29
Behavioral task
behavioral1
Sample
e970733f711e16e343dffe889bff12e9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
e970733f711e16e343dffe889bff12e9.exe
Resource
win10v2004-20231215-en
General
-
Target
e970733f711e16e343dffe889bff12e9.exe
-
Size
755KB
-
MD5
e970733f711e16e343dffe889bff12e9
-
SHA1
f9943502f4e0b28faf60f857539001e177cdacb7
-
SHA256
c24a8416ac35c87dd30e5812dafec562b358f87382dfd5100cb62bf20b5c34a4
-
SHA512
0023329453894674bf0a9c649a9d368cb0fef3a3cd6d1fc2579b850d5a01b176a69d5e8f1ed01ea1c2f726ee7d42ab1ee31e1f6897985e8bb4d65f75979b36a8
-
SSDEEP
12288:xoxejOONAM7GUC1Jr+4o628gx2Jw+tP3Jzm8JORGXCJdw/oX+pd167QhEQO:2xY3NtGUmJr+4Obxd+tPZSZQ/oE6EhE
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2200-15-0x0000000000400000-0x00000000004C8000-memory.dmp fakeav -
Executes dropped EXE 1 IoCs
pid Process 2296 KeyGen.exe -
resource yara_rule behavioral1/memory/2296-13-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x002c00000001529f-12.dat upx behavioral1/memory/2296-16-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2296-17-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2296-18-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2296-19-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2296-20-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2296-21-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2296-22-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2296-23-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2296-24-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2296-25-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2296-26-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2296-27-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2296-28-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2296-29-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2296-30-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CSRLT.EXE = "C:\\Windows\\system32\\CSRLT.EXE" e970733f711e16e343dffe889bff12e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\MSBLT.EXE = "C:\\Windows\\MSBLT.EXE" e970733f711e16e343dffe889bff12e9.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\CSRLT.EXE e970733f711e16e343dffe889bff12e9.exe File opened for modification C:\Windows\SysWOW64\CSRLT.EXE e970733f711e16e343dffe889bff12e9.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\MSBLT.EXE e970733f711e16e343dffe889bff12e9.exe File opened for modification C:\Windows\MSBLT.EXE e970733f711e16e343dffe889bff12e9.exe File created C:\Windows\KeyGen.exe e970733f711e16e343dffe889bff12e9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2296 KeyGen.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2296 KeyGen.exe 2296 KeyGen.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2296 2200 e970733f711e16e343dffe889bff12e9.exe 28 PID 2200 wrote to memory of 2296 2200 e970733f711e16e343dffe889bff12e9.exe 28 PID 2200 wrote to memory of 2296 2200 e970733f711e16e343dffe889bff12e9.exe 28 PID 2200 wrote to memory of 2296 2200 e970733f711e16e343dffe889bff12e9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e970733f711e16e343dffe889bff12e9.exe"C:\Users\Admin\AppData\Local\Temp\e970733f711e16e343dffe889bff12e9.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\KeyGen.exe"C:\Windows\KeyGen.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5e3c7d489013b51c671aa79c9068a2a00
SHA1deed13e52afcc9fd2ef326fb6b0aa4bf7fcf14be
SHA2565ea232ac5ebca4584f8689d5a1ed466404272a5c5496f41934537504368b5da2
SHA51218a31ffcc796d6352142374dc0e12d83b9b46d56069a5db26a38b0f6a133302f13d7064bfe9bc16e7a705aeeb2cec2d654863d92280a6085c8202a3c8096b240