Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 01:38
Static task
static1
Behavioral task
behavioral1
Sample
230e363c79668e08add90ab9653a8421.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
230e363c79668e08add90ab9653a8421.exe
Resource
win10v2004-20231215-en
General
-
Target
230e363c79668e08add90ab9653a8421.exe
-
Size
80KB
-
MD5
230e363c79668e08add90ab9653a8421
-
SHA1
4f1e8b43ccbbc7bfe9dda4c353efd6cc557c5f46
-
SHA256
fbfd354cee70d330f86293b167b5d9df03dd384d796870e76a0cab5cce8e990b
-
SHA512
3dfe1e386549240ac026aab1dc5e6d72f2363cb88af0d32daccec75fc9ff7f6b8c75ffd3be26ab247a4885497b61a72a4bd7d16bab6dde03d0ac474f98f7508d
-
SSDEEP
1536:q/YKbiDTW03TN7vPs9NoruIMbdS9baW1JdQYjMQqb:qQLDTdTtvPs9qr6S9GAdQYAQ
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1584 attrib.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\system = "C:\\windows\\system32\\csvclhosts.exe" 230e363c79668e08add90ab9653a8421.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\windows\SysWOW64\csvclhosts.exe 230e363c79668e08add90ab9653a8421.exe File opened for modification C:\windows\SysWOW64\csvclhosts.exe 230e363c79668e08add90ab9653a8421.exe File opened for modification C:\windows\SysWOW64\csvclhosts.exe attrib.exe File created C:\windows\SysWOW64\Blliss.scr 230e363c79668e08add90ab9653a8421.exe File opened for modification C:\windows\SysWOW64\Blliss.scr 230e363c79668e08add90ab9653a8421.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1868 230e363c79668e08add90ab9653a8421.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1868 230e363c79668e08add90ab9653a8421.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1868 wrote to memory of 1584 1868 230e363c79668e08add90ab9653a8421.exe 88 PID 1868 wrote to memory of 1584 1868 230e363c79668e08add90ab9653a8421.exe 88 PID 1868 wrote to memory of 1584 1868 230e363c79668e08add90ab9653a8421.exe 88 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1584 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\230e363c79668e08add90ab9653a8421.exe"C:\Users\Admin\AppData\Local\Temp\230e363c79668e08add90ab9653a8421.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\attrib.exeattrib +r +s +h C:\windows\system32\csvclhosts.exe2⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
PID:1584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5230e363c79668e08add90ab9653a8421
SHA14f1e8b43ccbbc7bfe9dda4c353efd6cc557c5f46
SHA256fbfd354cee70d330f86293b167b5d9df03dd384d796870e76a0cab5cce8e990b
SHA5123dfe1e386549240ac026aab1dc5e6d72f2363cb88af0d32daccec75fc9ff7f6b8c75ffd3be26ab247a4885497b61a72a4bd7d16bab6dde03d0ac474f98f7508d