Analysis
-
max time kernel
6s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
16-02-2024 11:32
Static task
static1
Behavioral task
behavioral1
Sample
a04598775fae6b5adc9a95381961f18c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a04598775fae6b5adc9a95381961f18c.exe
Resource
win10v2004-20231215-en
General
-
Target
a04598775fae6b5adc9a95381961f18c.exe
-
Size
88KB
-
MD5
a04598775fae6b5adc9a95381961f18c
-
SHA1
80391427a2f16c4e05fbda58d8b6a92dcf3e0e46
-
SHA256
fc58af62e63a634abbe88f3d777792185ef184129569a6a029ead976e34acbfa
-
SHA512
b29cafd7e380c23efd95f99e54b6d94819eda10ed50fa5d60e1b71322854ac6a628321574212714b7369f7e5c908a6b47a7bcc32f501944faa66fca1e1692bd5
-
SSDEEP
1536:tQzq7KAAwJENVy7yCe3j77GgP6UmGGJXkBKuZgQc:toAK3wqNUmb3jGgPZc4XZgQc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1868 crss.exe -
Loads dropped DLL 2 IoCs
pid Process 2692 a04598775fae6b5adc9a95381961f18c.exe 2692 a04598775fae6b5adc9a95381961f18c.exe -
resource yara_rule behavioral1/memory/3060-5-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/3060-7-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/3060-18-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/3060-21-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/3060-16-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/3060-11-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/3060-94-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2684-95-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/3060-97-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2684-98-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\Profile Manager2 = "C:\\Users\\Admin\\crss.exe" a04598775fae6b5adc9a95381961f18c.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\Document Explorer2 = "C:\\Users\\Admin\\Documents\\crss.exe" a04598775fae6b5adc9a95381961f18c.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\Download Manager2 = "C:\\Users\\Admin\\Downloads\\crss.exe" a04598775fae6b5adc9a95381961f18c.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2368 set thread context of 3060 2368 a04598775fae6b5adc9a95381961f18c.exe 28 PID 2368 set thread context of 2692 2368 a04598775fae6b5adc9a95381961f18c.exe 29 -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2608 ipconfig.exe 2856 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2368 a04598775fae6b5adc9a95381961f18c.exe 3060 a04598775fae6b5adc9a95381961f18c.exe 1868 crss.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2368 wrote to memory of 3060 2368 a04598775fae6b5adc9a95381961f18c.exe 28 PID 2368 wrote to memory of 3060 2368 a04598775fae6b5adc9a95381961f18c.exe 28 PID 2368 wrote to memory of 3060 2368 a04598775fae6b5adc9a95381961f18c.exe 28 PID 2368 wrote to memory of 3060 2368 a04598775fae6b5adc9a95381961f18c.exe 28 PID 2368 wrote to memory of 3060 2368 a04598775fae6b5adc9a95381961f18c.exe 28 PID 2368 wrote to memory of 3060 2368 a04598775fae6b5adc9a95381961f18c.exe 28 PID 2368 wrote to memory of 3060 2368 a04598775fae6b5adc9a95381961f18c.exe 28 PID 2368 wrote to memory of 3060 2368 a04598775fae6b5adc9a95381961f18c.exe 28 PID 2368 wrote to memory of 2692 2368 a04598775fae6b5adc9a95381961f18c.exe 29 PID 2368 wrote to memory of 2692 2368 a04598775fae6b5adc9a95381961f18c.exe 29 PID 2368 wrote to memory of 2692 2368 a04598775fae6b5adc9a95381961f18c.exe 29 PID 2368 wrote to memory of 2692 2368 a04598775fae6b5adc9a95381961f18c.exe 29 PID 2368 wrote to memory of 2692 2368 a04598775fae6b5adc9a95381961f18c.exe 29 PID 2368 wrote to memory of 2692 2368 a04598775fae6b5adc9a95381961f18c.exe 29 PID 2368 wrote to memory of 2692 2368 a04598775fae6b5adc9a95381961f18c.exe 29 PID 2368 wrote to memory of 2692 2368 a04598775fae6b5adc9a95381961f18c.exe 29 PID 2368 wrote to memory of 2692 2368 a04598775fae6b5adc9a95381961f18c.exe 29 PID 2368 wrote to memory of 2692 2368 a04598775fae6b5adc9a95381961f18c.exe 29 PID 2692 wrote to memory of 1868 2692 a04598775fae6b5adc9a95381961f18c.exe 30 PID 2692 wrote to memory of 1868 2692 a04598775fae6b5adc9a95381961f18c.exe 30 PID 2692 wrote to memory of 1868 2692 a04598775fae6b5adc9a95381961f18c.exe 30 PID 2692 wrote to memory of 1868 2692 a04598775fae6b5adc9a95381961f18c.exe 30 PID 3060 wrote to memory of 2608 3060 a04598775fae6b5adc9a95381961f18c.exe 31 PID 3060 wrote to memory of 2608 3060 a04598775fae6b5adc9a95381961f18c.exe 31 PID 3060 wrote to memory of 2608 3060 a04598775fae6b5adc9a95381961f18c.exe 31 PID 3060 wrote to memory of 2608 3060 a04598775fae6b5adc9a95381961f18c.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a04598775fae6b5adc9a95381961f18c.exe"C:\Users\Admin\AppData\Local\Temp\a04598775fae6b5adc9a95381961f18c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\a04598775fae6b5adc9a95381961f18c.exe"C:\Users\Admin\AppData\Local\Temp\a04598775fae6b5adc9a95381961f18c.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew3⤵
- Gathers network information
PID:2608
-
-
-
C:\Users\Admin\AppData\Local\Temp\a04598775fae6b5adc9a95381961f18c.exe"C:\Users\Admin\AppData\Local\Temp\a04598775fae6b5adc9a95381961f18c.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\crss.exe"C:\Users\Admin\crss.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1868 -
C:\Users\Admin\crss.exe"C:\Users\Admin\crss.exe"4⤵PID:2684
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew5⤵
- Gathers network information
PID:2856
-
-
-
C:\Users\Admin\crss.exe"C:\Users\Admin\crss.exe"4⤵PID:2540
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5a04598775fae6b5adc9a95381961f18c
SHA180391427a2f16c4e05fbda58d8b6a92dcf3e0e46
SHA256fc58af62e63a634abbe88f3d777792185ef184129569a6a029ead976e34acbfa
SHA512b29cafd7e380c23efd95f99e54b6d94819eda10ed50fa5d60e1b71322854ac6a628321574212714b7369f7e5c908a6b47a7bcc32f501944faa66fca1e1692bd5