Analysis
-
max time kernel
92s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 09:30
Behavioral task
behavioral1
Sample
c5867e53e86ebb5549017903fffd97e2.exe
Resource
win7-20240220-en
General
-
Target
c5867e53e86ebb5549017903fffd97e2.exe
-
Size
74KB
-
MD5
c5867e53e86ebb5549017903fffd97e2
-
SHA1
9791c665ae9354a210b8ee08d8f80241c5794936
-
SHA256
227c4212500ea1ee87b31276fd26b6803cae4bf8775cb130559672960327f485
-
SHA512
cd5dec204110f031a2f5401276dc4023962f8d85dbb1e94753fef4f63743c349f44a92f23784a3bdb704b090f401cdea80f1741456f3c91bbef52e04c29521a7
-
SSDEEP
1536:P9HtEetQfYioFyNjL3WQ7vxXnIch/nJcappIpOqT9E3db93OOBadX+IlzFNjIf:PFdtQfYix1Zh3I1T9w/BadX9FSf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3404 cstart-tmp.exe -
resource yara_rule behavioral2/memory/2420-0-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/files/0x0009000000023212-5.dat upx behavioral2/memory/2420-7-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/3404-8-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/3404-33-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\gvcasinos.ini cstart-tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2420 wrote to memory of 3404 2420 c5867e53e86ebb5549017903fffd97e2.exe 85 PID 2420 wrote to memory of 3404 2420 c5867e53e86ebb5549017903fffd97e2.exe 85 PID 2420 wrote to memory of 3404 2420 c5867e53e86ebb5549017903fffd97e2.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5867e53e86ebb5549017903fffd97e2.exe"C:\Users\Admin\AppData\Local\Temp\c5867e53e86ebb5549017903fffd97e2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\cstart-tmp.exe"C:\Users\Admin\AppData\Local\Temp\cstart-tmp.exe" /wait 24202⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5c5867e53e86ebb5549017903fffd97e2
SHA19791c665ae9354a210b8ee08d8f80241c5794936
SHA256227c4212500ea1ee87b31276fd26b6803cae4bf8775cb130559672960327f485
SHA512cd5dec204110f031a2f5401276dc4023962f8d85dbb1e94753fef4f63743c349f44a92f23784a3bdb704b090f401cdea80f1741456f3c91bbef52e04c29521a7
-
Filesize
4KB
MD51be8806a79728b9fa0e0f977e691f24c
SHA1e30754f7e0b0e31c9c99b7636fd77c92a6b121ea
SHA2562fb9affb64fe1e17f788cbf8183a5078fa826cda1f33e741fd937f535b4e6cbc
SHA51243f29f8847ed6ce6ccfccdda680d176f50ca3fa3529399b15dabdc5c0c510e29293b2864822669906bf61e21ed65ca087c3d943c4748f96e00440bccb53c3291
-
Filesize
4KB
MD567389a3fd30c534369674c4a6cccc796
SHA15ccb98af6c556eda03b994cc96bee737a7c2b29e
SHA2561fd9611225c8d904eabcb3e6c88f1be872e3792f83832aa691b49126b4c5dead
SHA512bc01548bce3bf81672f373a8585f12c6da2bde94eb880f69e492ebc692725f0ac9c68fa437c43fc571ded2fbc510c23a918f23a27fac10d0357e5f8ada97a358
-
Filesize
36B
MD526c759a5864fec759f2a7f25de9126b2
SHA1abf1ce13092222e3d8bb3b5fbb4aed61dda38a36
SHA2564a5f65b5e5d77649251661bb7ab6ba4b313e30b3063fb20d5b4677525e5547a7
SHA51224039d4460fa965093785319bf3abfe1acb9b5eb4322ed8109fd1633737f00b4f28b310afdf04b1f44567e9420ff7d020491585c16125de0b182593c569a4e28