Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 04:42
Behavioral task
behavioral1
Sample
0eda7f7833d52f885efd7d6a71f40d0b.exe
Resource
win7-20231129-en
windows7-x64
7 signatures
150 seconds
General
-
Target
0eda7f7833d52f885efd7d6a71f40d0b.exe
-
Size
75KB
-
MD5
0eda7f7833d52f885efd7d6a71f40d0b
-
SHA1
d00e0ba8dbbcb515971980b6a9ca9e494782d01d
-
SHA256
dd11d23ce78790c82cc07ee9e22ff5b07e5d284f8007ee574b27656325b572e2
-
SHA512
7bd3f98ce8efcbb9c5af4888a7d42d8bb0be2704af5cbc2e2e115a672fa3b18771939ae86f426560222bc9279da4eda6354836de785ba37798f305078fbf5dc0
-
SSDEEP
1536:CRAAzSDQTAcygwT4RaNuNUrrAHdx/8iOBk3XnpEldd5rjGu:MA2SUTaTPuNUrAOBk3XnWd5D
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1748 cstart-tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2224 0eda7f7833d52f885efd7d6a71f40d0b.exe 2224 0eda7f7833d52f885efd7d6a71f40d0b.exe -
resource yara_rule behavioral1/memory/2224-0-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1748-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2224-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1748-40-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\gvcasinos.ini cstart-tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 1748 2224 0eda7f7833d52f885efd7d6a71f40d0b.exe 16 PID 2224 wrote to memory of 1748 2224 0eda7f7833d52f885efd7d6a71f40d0b.exe 16 PID 2224 wrote to memory of 1748 2224 0eda7f7833d52f885efd7d6a71f40d0b.exe 16 PID 2224 wrote to memory of 1748 2224 0eda7f7833d52f885efd7d6a71f40d0b.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\cstart-tmp.exe"C:\Users\Admin\AppData\Local\Temp\cstart-tmp.exe" /wait 22241⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1748
-
C:\Users\Admin\AppData\Local\Temp\0eda7f7833d52f885efd7d6a71f40d0b.exe"C:\Users\Admin\AppData\Local\Temp\0eda7f7833d52f885efd7d6a71f40d0b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2224