Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 01:10
Static task
static1
Behavioral task
behavioral1
Sample
09a4ee7172282f87f7165a43c3e20f14.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
09a4ee7172282f87f7165a43c3e20f14.exe
Resource
win10v2004-20231215-en
General
-
Target
09a4ee7172282f87f7165a43c3e20f14.exe
-
Size
53KB
-
MD5
09a4ee7172282f87f7165a43c3e20f14
-
SHA1
b0a2ddd2d32f580fad0ec9b75e977c62fd4fd381
-
SHA256
752536b688fa896ba0ba7341bc2cc56be3ef6621f317d2dc5fed268920b33bd9
-
SHA512
304e9fbc0921b050920017087f33f02fb9900524b6182dd64fe2abcfbd7f0d79e496913b5bfab009f8008d6386f980fe65f29e16ffe2db89d298e7fff878bbf5
-
SSDEEP
1536:lsyqFguK7hKM1vd+XWdu1w2ksbvSjzdmxWP:lJhhKU1+XWdJ2kjjzdDP
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run p.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\system = "C:\\Windows\\csrss.exe" p.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 09a4ee7172282f87f7165a43c3e20f14.exe Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation p.exe -
Executes dropped EXE 3 IoCs
pid Process 4184 loader.exe 3632 p.exe 3300 csrss.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 IEXPLORE.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4184 set thread context of 4064 4184 loader.exe 97 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\csrss.exe p.exe File opened for modification C:\Windows\csrss.exe p.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 256 4732 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4064 IEXPLORE.EXE 3300 csrss.exe 3300 csrss.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4184 loader.exe Token: SeDebugPrivilege 3632 p.exe Token: SeDebugPrivilege 3300 csrss.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4732 wrote to memory of 4184 4732 09a4ee7172282f87f7165a43c3e20f14.exe 95 PID 4732 wrote to memory of 4184 4732 09a4ee7172282f87f7165a43c3e20f14.exe 95 PID 4732 wrote to memory of 4184 4732 09a4ee7172282f87f7165a43c3e20f14.exe 95 PID 4732 wrote to memory of 3632 4732 09a4ee7172282f87f7165a43c3e20f14.exe 96 PID 4732 wrote to memory of 3632 4732 09a4ee7172282f87f7165a43c3e20f14.exe 96 PID 4732 wrote to memory of 3632 4732 09a4ee7172282f87f7165a43c3e20f14.exe 96 PID 4184 wrote to memory of 4064 4184 loader.exe 97 PID 4184 wrote to memory of 4064 4184 loader.exe 97 PID 4184 wrote to memory of 4064 4184 loader.exe 97 PID 4184 wrote to memory of 4064 4184 loader.exe 97 PID 4184 wrote to memory of 4064 4184 loader.exe 97 PID 4184 wrote to memory of 4064 4184 loader.exe 97 PID 4184 wrote to memory of 4064 4184 loader.exe 97 PID 3632 wrote to memory of 3300 3632 p.exe 99 PID 3632 wrote to memory of 3300 3632 p.exe 99 PID 3632 wrote to memory of 3300 3632 p.exe 99 -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook csrss.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\09a4ee7172282f87f7165a43c3e20f14.exe"C:\Users\Admin\AppData\Local\Temp\09a4ee7172282f87f7165a43c3e20f14.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 3082⤵
- Program crash
PID:256
-
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"3⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
-
C:\Users\Admin\AppData\Local\Temp\p.exe"C:\Users\Admin\AppData\Local\Temp\p.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\csrss.exe"C:\Windows\csrss.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_win_path
PID:3300
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4732 -ip 47321⤵PID:3428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD52dfbd5bbe54d3b17258feedf83def347
SHA175f9695edee8475e214f18ebb76512296710d17d
SHA2568b43c0dd5f55bdeade612df66adf28abf96684688942199674d077bc1da82944
SHA5125ecaa8f1ab1fe1eb0e0fa1d48281663e8375ff63de4773aac2e22407e5bb4a0560f746b1f886397ea24ed387597fe5d5b6d60c1d2cae53062150e342a60f646a
-
Filesize
28KB
MD536c64a8b824970bbd991986f81fa8718
SHA1ae05cb686c3a1d79ff2e7a231b0e89befe527559
SHA2565ebf226334f2035d115db37664e25b075cbe00badf8090dac2a49b0714bde733
SHA512d1ca9364bc7e1cc4ef466da44f8213fb0f541635c5c4d3d0afb82fe4bea17d4ffff5efe5a198d8b818c632b35fd8e56beba14ddc24b89d8a9ff6a4ee214abc78