Analysis
-
max time kernel
34s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-02-2024 16:18
Static task
static1
Behavioral task
behavioral1
Sample
CristalixLauncher.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
CristalixLauncher.exe
Resource
win10v2004-20240226-en
General
-
Target
CristalixLauncher.exe
-
Size
6.8MB
-
MD5
193bf9df72716b53f91091865ad95a3d
-
SHA1
fbe2127ccf12d1fa2d5d2fd38920c767b9595648
-
SHA256
29750d9486434d4c2fea75ede7e18672c9e9fd36bf1f611674e0ae0cb46616fe
-
SHA512
7df422bc34c2312b0e539f2574278047123d0f3915b435c453cfe70e6e5452728f7ce6c54fafc453774080f0cda18cb2db2edbdbea8629a3a5346483835b1335
-
SSDEEP
196608:Zn3JrwbTDBDkmWt7i8heVQzSjVpAK/IpjIAUPC:Z3xw3NDkmieVQzyYjWPC
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3092 icacls.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4808 wrote to memory of 2020 4808 CristalixLauncher.exe 88 PID 4808 wrote to memory of 2020 4808 CristalixLauncher.exe 88 PID 2020 wrote to memory of 3092 2020 javaw.exe 90 PID 2020 wrote to memory of 3092 2020 javaw.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\CristalixLauncher.exe"C:\Users\Admin\AppData\Local\Temp\CristalixLauncher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Program Files\Java\jdk-1.8\bin\javaw.exe"C:\Program Files\Java\jdk-1.8\bin\javaw.exe" -XX:MinHeapFreeRatio=5 -XX:MaxHeapFreeRatio=15 -jar "CristalixLauncher.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M3⤵
- Modifies file permissions
PID:3092
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50B
MD505502c881369c9684dd50042fa0f5575
SHA1217ace25311e57fb4dbb7023b9ed6cd70f028f73
SHA25672379ae4286d6fabc406409966c961eb15ddfa75f04fb61ba64fab2fd9fc3cc6
SHA51253a0f3d185eef5551ac05d0f1e8a69d1410f95a39eb51019f2aa8edfb56dcd13ad8b353c80fdbf5a2cd38f064e5fe248ffdb768d03534267466541b8b7bf43aa