Analysis
-
max time kernel
220s -
max time network
245s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2023 16:29
Behavioral task
behavioral1
Sample
e970733f711e16e343dffe889bff12e9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
e970733f711e16e343dffe889bff12e9.exe
Resource
win10v2004-20231215-en
General
-
Target
e970733f711e16e343dffe889bff12e9.exe
-
Size
755KB
-
MD5
e970733f711e16e343dffe889bff12e9
-
SHA1
f9943502f4e0b28faf60f857539001e177cdacb7
-
SHA256
c24a8416ac35c87dd30e5812dafec562b358f87382dfd5100cb62bf20b5c34a4
-
SHA512
0023329453894674bf0a9c649a9d368cb0fef3a3cd6d1fc2579b850d5a01b176a69d5e8f1ed01ea1c2f726ee7d42ab1ee31e1f6897985e8bb4d65f75979b36a8
-
SSDEEP
12288:xoxejOONAM7GUC1Jr+4o628gx2Jw+tP3Jzm8JORGXCJdw/oX+pd167QhEQO:2xY3NtGUmJr+4Obxd+tPZSZQ/oE6EhE
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2012-1-0x0000000000400000-0x00000000004C8000-memory.dmp fakeav behavioral2/memory/2012-7-0x0000000000400000-0x00000000004C8000-memory.dmp fakeav behavioral2/memory/2012-19-0x0000000000400000-0x00000000004C8000-memory.dmp fakeav behavioral2/memory/2012-22-0x0000000000400000-0x00000000004C8000-memory.dmp fakeav -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation e970733f711e16e343dffe889bff12e9.exe -
Executes dropped EXE 1 IoCs
pid Process 4712 KeyGen.exe -
resource yara_rule behavioral2/files/0x0006000000023217-11.dat upx behavioral2/memory/4712-18-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4712-21-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4712-23-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4712-24-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CSRLT.EXE = "C:\\Windows\\system32\\CSRLT.EXE" e970733f711e16e343dffe889bff12e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\MSBLT.EXE = "C:\\Windows\\MSBLT.EXE" e970733f711e16e343dffe889bff12e9.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\CSRLT.EXE e970733f711e16e343dffe889bff12e9.exe File opened for modification C:\Windows\SysWOW64\CSRLT.EXE e970733f711e16e343dffe889bff12e9.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\MSBLT.EXE e970733f711e16e343dffe889bff12e9.exe File created C:\Windows\KeyGen.exe e970733f711e16e343dffe889bff12e9.exe File created C:\Windows\MSBLT.EXE e970733f711e16e343dffe889bff12e9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4712 KeyGen.exe 4712 KeyGen.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2012 wrote to memory of 4712 2012 e970733f711e16e343dffe889bff12e9.exe 94 PID 2012 wrote to memory of 4712 2012 e970733f711e16e343dffe889bff12e9.exe 94 PID 2012 wrote to memory of 4712 2012 e970733f711e16e343dffe889bff12e9.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\e970733f711e16e343dffe889bff12e9.exe"C:\Users\Admin\AppData\Local\Temp\e970733f711e16e343dffe889bff12e9.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\KeyGen.exe"C:\Windows\KeyGen.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5e3c7d489013b51c671aa79c9068a2a00
SHA1deed13e52afcc9fd2ef326fb6b0aa4bf7fcf14be
SHA2565ea232ac5ebca4584f8689d5a1ed466404272a5c5496f41934537504368b5da2
SHA51218a31ffcc796d6352142374dc0e12d83b9b46d56069a5db26a38b0f6a133302f13d7064bfe9bc16e7a705aeeb2cec2d654863d92280a6085c8202a3c8096b240