Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2024 17:10
Static task
static1
Behavioral task
behavioral1
Sample
7aceb8b464e70884cf67cd4b95cab6f8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7aceb8b464e70884cf67cd4b95cab6f8.exe
Resource
win10v2004-20231222-en
General
-
Target
7aceb8b464e70884cf67cd4b95cab6f8.exe
-
Size
378KB
-
MD5
7aceb8b464e70884cf67cd4b95cab6f8
-
SHA1
ed76e4705d7462f228a1a65fc5c555e0eedef258
-
SHA256
19d4f2315168ef8ba41ea08821ee0954ad89f9ae90408f07ee39bc28f52a2326
-
SHA512
36a78c3577f6ab281380b3d5d6c8271a1af03d5cfb332573d0b39bd34700c08fc2b49ee359fb9e347b6c72e5260e72f3db646245ca35bd0c182213b62f1c9ade
-
SSDEEP
6144:Ou0s1PdkyyNGf0d/p5RUQ/RN7OTKqyd7qUPakZ2KDKl2tjVcmAYx1s:OLpgf05p5nWTc7AkZ24zX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3040 csrss.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WINDOWS CSRSS SERVICE = "C:\\Windows\\csrss.exe" 7aceb8b464e70884cf67cd4b95cab6f8.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WINDOWS CSRSS SERVICE = "C:\\Windows\\csrss.exe" csrss.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\csrss.exe 7aceb8b464e70884cf67cd4b95cab6f8.exe File opened for modification C:\Windows\csrss.exe 7aceb8b464e70884cf67cd4b95cab6f8.exe File created C:\Windows\csrss.exe csrss.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3216 wrote to memory of 3040 3216 7aceb8b464e70884cf67cd4b95cab6f8.exe 85 PID 3216 wrote to memory of 3040 3216 7aceb8b464e70884cf67cd4b95cab6f8.exe 85 PID 3216 wrote to memory of 3040 3216 7aceb8b464e70884cf67cd4b95cab6f8.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\7aceb8b464e70884cf67cd4b95cab6f8.exe"C:\Users\Admin\AppData\Local\Temp\7aceb8b464e70884cf67cd4b95cab6f8.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\csrss.exeC:\Windows\csrss.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
378KB
MD57aceb8b464e70884cf67cd4b95cab6f8
SHA1ed76e4705d7462f228a1a65fc5c555e0eedef258
SHA25619d4f2315168ef8ba41ea08821ee0954ad89f9ae90408f07ee39bc28f52a2326
SHA51236a78c3577f6ab281380b3d5d6c8271a1af03d5cfb332573d0b39bd34700c08fc2b49ee359fb9e347b6c72e5260e72f3db646245ca35bd0c182213b62f1c9ade