Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 20:26
Static task
static1
Behavioral task
behavioral1
Sample
f5d155a7877be88833507b9373602bc3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f5d155a7877be88833507b9373602bc3.exe
Resource
win10v2004-20231215-en
General
-
Target
f5d155a7877be88833507b9373602bc3.exe
-
Size
982KB
-
MD5
f5d155a7877be88833507b9373602bc3
-
SHA1
7a60f05af359ee7cd730f837b73b304eafaf253d
-
SHA256
46664efe2204787719a152719c072d5d301ba8965c9317cf08ab627412eaef4b
-
SHA512
4be5da454539f6e1d95fd8677e40e96fe6dc263a740234b2fc39211204b4c568e8ad53e10545569dab559950b9a40ad9d05842efb38d62adc4b8be00544f8f8e
-
SSDEEP
12288:FSjzwRzH1RighUFZzHtC9FDY8c8H+Lm/yjxeiSOHTApwn2fTrNsef1JOX1:geVRrhMxY9FDY8cLa/OerzTrNtS
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Windows\\csrss.exe" csrss.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation f5d155a7877be88833507b9373602bc3.exe -
Executes dropped EXE 1 IoCs
pid Process 1652 csrss.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\csrss.exe f5d155a7877be88833507b9373602bc3.exe File opened for modification C:\Windows\winlogs.dll csrss.exe File opened for modification C:\Windows\csrss.exe csrss.exe File created C:\Windows\winlogs.dll f5d155a7877be88833507b9373602bc3.exe File opened for modification C:\Windows\winlogs.dll f5d155a7877be88833507b9373602bc3.exe File created C:\Windows\csrss.exe f5d155a7877be88833507b9373602bc3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSystemtimePrivilege 1652 csrss.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1652 csrss.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3108 wrote to memory of 1652 3108 f5d155a7877be88833507b9373602bc3.exe 93 PID 3108 wrote to memory of 1652 3108 f5d155a7877be88833507b9373602bc3.exe 93 PID 3108 wrote to memory of 1652 3108 f5d155a7877be88833507b9373602bc3.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5d155a7877be88833507b9373602bc3.exe"C:\Users\Admin\AppData\Local\Temp\f5d155a7877be88833507b9373602bc3.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\csrss.exe"C:\Windows\csrss.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1652
-