Analysis
-
max time kernel
158s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-01-2024 10:35
Static task
static1
Behavioral task
behavioral1
Sample
56392089cbf8187636317ab83a2c12aa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56392089cbf8187636317ab83a2c12aa.exe
Resource
win10v2004-20231215-en
General
-
Target
56392089cbf8187636317ab83a2c12aa.exe
-
Size
15KB
-
MD5
56392089cbf8187636317ab83a2c12aa
-
SHA1
29dde0eba73888ebdb049278829862be70d2dc1e
-
SHA256
d3c5dfc940753fc819ace0c55216442a7cb090fec27e856071da176efdbc87c0
-
SHA512
fb6e9b85d4067d109cec37546c545e1dbac29d528912b2189b368e663fd4ad66b2f5dc34e117ef53cfc3674e8bcae8a1e4a4282ced9664f261b5ac967793472b
-
SSDEEP
384:AERvojPXWhimbGz7RyaWtugEzCkLAExM842:LRksghxMN
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe \"C:\\Windows\\csrss.exe\"" csrss.exe -
Deletes itself 1 IoCs
pid Process 2780 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2824 csrss.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\csrss.exe cmd.exe File opened for modification C:\Windows\csrss.exe cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2976 56392089cbf8187636317ab83a2c12aa.exe Token: SeIncBasePriorityPrivilege 2976 56392089cbf8187636317ab83a2c12aa.exe Token: SeIncBasePriorityPrivilege 2976 56392089cbf8187636317ab83a2c12aa.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2232 2976 56392089cbf8187636317ab83a2c12aa.exe 27 PID 2976 wrote to memory of 2232 2976 56392089cbf8187636317ab83a2c12aa.exe 27 PID 2976 wrote to memory of 2232 2976 56392089cbf8187636317ab83a2c12aa.exe 27 PID 2976 wrote to memory of 2232 2976 56392089cbf8187636317ab83a2c12aa.exe 27 PID 2976 wrote to memory of 2824 2976 56392089cbf8187636317ab83a2c12aa.exe 29 PID 2976 wrote to memory of 2824 2976 56392089cbf8187636317ab83a2c12aa.exe 29 PID 2976 wrote to memory of 2824 2976 56392089cbf8187636317ab83a2c12aa.exe 29 PID 2976 wrote to memory of 2824 2976 56392089cbf8187636317ab83a2c12aa.exe 29 PID 2976 wrote to memory of 2780 2976 56392089cbf8187636317ab83a2c12aa.exe 31 PID 2976 wrote to memory of 2780 2976 56392089cbf8187636317ab83a2c12aa.exe 31 PID 2976 wrote to memory of 2780 2976 56392089cbf8187636317ab83a2c12aa.exe 31 PID 2976 wrote to memory of 2780 2976 56392089cbf8187636317ab83a2c12aa.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\56392089cbf8187636317ab83a2c12aa.exe"C:\Users\Admin\AppData\Local\Temp\56392089cbf8187636317ab83a2c12aa.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\cmd.execmd /c copy "C:\Users\Admin\AppData\Local\Temp\56392089cbf8187636317ab83a2c12aa.exe" "C:\Windows\csrss.exe"2⤵
- Drops file in Windows directory
PID:2232
-
-
C:\Windows\csrss.exeC:\Windows\csrss.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
PID:2824
-
-
C:\Windows\SysWOW64\cmd.execmd /c delme.bat2⤵
- Deletes itself
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
193B
MD56725fd93b31835314e18db0a923086e8
SHA1bfcd0336a837d11cd6498a55d8dba9c7101ccdf4
SHA256c3982255b179846faa9b1ab0d186c9eea0594a61edb5618c6641531ecf88fe4c
SHA512c262af8ed1dae0139afff2fc276b974aeb1f429bf1a454d66af8a2ed2f06a0cae1ef5ea50ccb5e42dc93c182cc2718223378045a703befe96092a2fe2ffbe744
-
Filesize
15KB
MD556392089cbf8187636317ab83a2c12aa
SHA129dde0eba73888ebdb049278829862be70d2dc1e
SHA256d3c5dfc940753fc819ace0c55216442a7cb090fec27e856071da176efdbc87c0
SHA512fb6e9b85d4067d109cec37546c545e1dbac29d528912b2189b368e663fd4ad66b2f5dc34e117ef53cfc3674e8bcae8a1e4a4282ced9664f261b5ac967793472b