Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 09:30
Behavioral task
behavioral1
Sample
c5867e53e86ebb5549017903fffd97e2.exe
Resource
win7-20240220-en
General
-
Target
c5867e53e86ebb5549017903fffd97e2.exe
-
Size
74KB
-
MD5
c5867e53e86ebb5549017903fffd97e2
-
SHA1
9791c665ae9354a210b8ee08d8f80241c5794936
-
SHA256
227c4212500ea1ee87b31276fd26b6803cae4bf8775cb130559672960327f485
-
SHA512
cd5dec204110f031a2f5401276dc4023962f8d85dbb1e94753fef4f63743c349f44a92f23784a3bdb704b090f401cdea80f1741456f3c91bbef52e04c29521a7
-
SSDEEP
1536:P9HtEetQfYioFyNjL3WQ7vxXnIch/nJcappIpOqT9E3db93OOBadX+IlzFNjIf:PFdtQfYix1Zh3I1T9w/BadX9FSf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2752 cstart-tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 1120 c5867e53e86ebb5549017903fffd97e2.exe 1120 c5867e53e86ebb5549017903fffd97e2.exe -
resource yara_rule behavioral1/memory/1120-0-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/files/0x000c00000001225d-4.dat upx behavioral1/memory/1120-11-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/memory/2752-12-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/memory/2752-38-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\gvcasinos.ini cstart-tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1120 wrote to memory of 2752 1120 c5867e53e86ebb5549017903fffd97e2.exe 28 PID 1120 wrote to memory of 2752 1120 c5867e53e86ebb5549017903fffd97e2.exe 28 PID 1120 wrote to memory of 2752 1120 c5867e53e86ebb5549017903fffd97e2.exe 28 PID 1120 wrote to memory of 2752 1120 c5867e53e86ebb5549017903fffd97e2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5867e53e86ebb5549017903fffd97e2.exe"C:\Users\Admin\AppData\Local\Temp\c5867e53e86ebb5549017903fffd97e2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\cstart-tmp.exe"C:\Users\Admin\AppData\Local\Temp\cstart-tmp.exe" /wait 11202⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD545ed335a6c6aacfd964501d6395720a4
SHA19fb138d72a1f9660fa009e790fa40d418bc4bbe1
SHA2561548ad71fe7ed6eca78afd9f2fcc5bd8273156c5ef9f552844e90f4e5f4f44ad
SHA512cf709b93990afded7e006283615664ddac821f58bdf0a343d4766fdd6e4a64cd545b69915ff4c1cc73a4a168b9d2f8bc1db9269981db19fec6a24c8c1139fe03
-
Filesize
36B
MD526c759a5864fec759f2a7f25de9126b2
SHA1abf1ce13092222e3d8bb3b5fbb4aed61dda38a36
SHA2564a5f65b5e5d77649251661bb7ab6ba4b313e30b3063fb20d5b4677525e5547a7
SHA51224039d4460fa965093785319bf3abfe1acb9b5eb4322ed8109fd1633737f00b4f28b310afdf04b1f44567e9420ff7d020491585c16125de0b182593c569a4e28
-
Filesize
74KB
MD5c5867e53e86ebb5549017903fffd97e2
SHA19791c665ae9354a210b8ee08d8f80241c5794936
SHA256227c4212500ea1ee87b31276fd26b6803cae4bf8775cb130559672960327f485
SHA512cd5dec204110f031a2f5401276dc4023962f8d85dbb1e94753fef4f63743c349f44a92f23784a3bdb704b090f401cdea80f1741456f3c91bbef52e04c29521a7