Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 23:11
Static task
static1
Behavioral task
behavioral1
Sample
069160bf4e0271b4aa6994f793b995d5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
069160bf4e0271b4aa6994f793b995d5.exe
Resource
win10v2004-20231215-en
General
-
Target
069160bf4e0271b4aa6994f793b995d5.exe
-
Size
80KB
-
MD5
069160bf4e0271b4aa6994f793b995d5
-
SHA1
12c8a2b32eb7c90f0de4fece3bd0150392add5be
-
SHA256
65bac223040f4e9b89950bfb354348cf86122405dfaba6d9cd4ad55a3e4d3cea
-
SHA512
97bfae0aa5ff60b650c01d514e89a062d2f233da1a7e5d7bab590987f9bb49d29339ad5a4557560ed2cc8b689eb165b3dfcc852ba1c55fd05b6fa35f560ea6ff
-
SSDEEP
1536:n7HoOPZJkeOQtbs1/yK8lFvEmR3MJrhRj:LbOQtbs8RPEttR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 824 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2340 csrcs.exe -
Loads dropped DLL 2 IoCs
pid Process 824 svchost.exe 824 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrcs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\csrcs.exe" svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1436 set thread context of 824 1436 069160bf4e0271b4aa6994f793b995d5.exe 28 PID 2340 set thread context of 2876 2340 csrcs.exe 30 -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1436 wrote to memory of 824 1436 069160bf4e0271b4aa6994f793b995d5.exe 28 PID 1436 wrote to memory of 824 1436 069160bf4e0271b4aa6994f793b995d5.exe 28 PID 1436 wrote to memory of 824 1436 069160bf4e0271b4aa6994f793b995d5.exe 28 PID 1436 wrote to memory of 824 1436 069160bf4e0271b4aa6994f793b995d5.exe 28 PID 1436 wrote to memory of 824 1436 069160bf4e0271b4aa6994f793b995d5.exe 28 PID 1436 wrote to memory of 824 1436 069160bf4e0271b4aa6994f793b995d5.exe 28 PID 1436 wrote to memory of 824 1436 069160bf4e0271b4aa6994f793b995d5.exe 28 PID 1436 wrote to memory of 824 1436 069160bf4e0271b4aa6994f793b995d5.exe 28 PID 1436 wrote to memory of 824 1436 069160bf4e0271b4aa6994f793b995d5.exe 28 PID 824 wrote to memory of 2340 824 svchost.exe 31 PID 824 wrote to memory of 2340 824 svchost.exe 31 PID 824 wrote to memory of 2340 824 svchost.exe 31 PID 824 wrote to memory of 2340 824 svchost.exe 31 PID 2340 wrote to memory of 2876 2340 csrcs.exe 30 PID 2340 wrote to memory of 2876 2340 csrcs.exe 30 PID 2340 wrote to memory of 2876 2340 csrcs.exe 30 PID 2340 wrote to memory of 2876 2340 csrcs.exe 30 PID 2340 wrote to memory of 2876 2340 csrcs.exe 30 PID 2340 wrote to memory of 2876 2340 csrcs.exe 30 PID 2340 wrote to memory of 2876 2340 csrcs.exe 30 PID 2340 wrote to memory of 2876 2340 csrcs.exe 30 PID 2340 wrote to memory of 2876 2340 csrcs.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\069160bf4e0271b4aa6994f793b995d5.exe"C:\Users\Admin\AppData\Local\Temp\069160bf4e0271b4aa6994f793b995d5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Deletes itself
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\csrcs.exe"C:\Users\Admin\AppData\Local\Temp\csrcs.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2340
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe1⤵PID:2876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5069160bf4e0271b4aa6994f793b995d5
SHA112c8a2b32eb7c90f0de4fece3bd0150392add5be
SHA25665bac223040f4e9b89950bfb354348cf86122405dfaba6d9cd4ad55a3e4d3cea
SHA51297bfae0aa5ff60b650c01d514e89a062d2f233da1a7e5d7bab590987f9bb49d29339ad5a4557560ed2cc8b689eb165b3dfcc852ba1c55fd05b6fa35f560ea6ff