Analysis
-
max time kernel
136s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 17:14
Static task
static1
Behavioral task
behavioral1
Sample
c92ae5be4af6e68ebf689a1d7c597703.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c92ae5be4af6e68ebf689a1d7c597703.exe
Resource
win10v2004-20240226-en
General
-
Target
c92ae5be4af6e68ebf689a1d7c597703.exe
-
Size
386KB
-
MD5
c92ae5be4af6e68ebf689a1d7c597703
-
SHA1
77dfbe5954d0c6c953e3839aa88e42d3d37aec99
-
SHA256
cf8f553cdf1b7748597a118416e41b1d6135633ebc6d0a09cefff76425855c7a
-
SHA512
cfd6fa9e1500191b8b896e885d69e7a502ae70539ea3c066114ebca69d704e17be2b592ae8a57f0173e9d82c37fe73bf942aa975f19cf810f68a48a668e70cff
-
SSDEEP
6144:naordEkMQn1aOrX4KXZFuD2QjGcjqQeHTTs1yFb7PM5WkKkX7VNuN:aorukMk19rXCXvgTIWXP+1G
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2156 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 336 csrss.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created \systemroot\assembly\GAC_64\Desktop.ini csrss.exe File created \systemroot\assembly\GAC_32\Desktop.ini csrss.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1808 set thread context of 2156 1808 c92ae5be4af6e68ebf689a1d7c597703.exe 28 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1808 c92ae5be4af6e68ebf689a1d7c597703.exe 1808 c92ae5be4af6e68ebf689a1d7c597703.exe 1808 c92ae5be4af6e68ebf689a1d7c597703.exe 1808 c92ae5be4af6e68ebf689a1d7c597703.exe 336 csrss.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1808 c92ae5be4af6e68ebf689a1d7c597703.exe Token: SeDebugPrivilege 1808 c92ae5be4af6e68ebf689a1d7c597703.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 336 csrss.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1808 wrote to memory of 1212 1808 c92ae5be4af6e68ebf689a1d7c597703.exe 21 PID 1808 wrote to memory of 336 1808 c92ae5be4af6e68ebf689a1d7c597703.exe 2 PID 1808 wrote to memory of 2156 1808 c92ae5be4af6e68ebf689a1d7c597703.exe 28 PID 1808 wrote to memory of 2156 1808 c92ae5be4af6e68ebf689a1d7c597703.exe 28 PID 1808 wrote to memory of 2156 1808 c92ae5be4af6e68ebf689a1d7c597703.exe 28 PID 1808 wrote to memory of 2156 1808 c92ae5be4af6e68ebf689a1d7c597703.exe 28 PID 1808 wrote to memory of 2156 1808 c92ae5be4af6e68ebf689a1d7c597703.exe 28 PID 336 wrote to memory of 2484 336 csrss.exe 30 PID 336 wrote to memory of 2484 336 csrss.exe 30 PID 336 wrote to memory of 2864 336 csrss.exe 31 PID 336 wrote to memory of 2864 336 csrss.exe 31 PID 336 wrote to memory of 848 336 csrss.exe 13
Processes
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:336
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵PID:848
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R2⤵PID:2484
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\c92ae5be4af6e68ebf689a1d7c597703.exe"C:\Users\Admin\AppData\Local\Temp\c92ae5be4af6e68ebf689a1d7c597703.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Deletes itself
PID:2156
-
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding1⤵PID:2864
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD562bdf8d92ee7e22d6dd8b68f3e923276
SHA1a178286e145f4f05365cbf7fe49384a13ffff492
SHA25661f0a30486888a8370efb1e9e13ae13b93824787914e35e5a5ff2d19bdc25bb9
SHA51270afc8270938c82de9f9ad959a4e2366cd95eceb0ebcb86204da30ce18ad6c5c7d4228023090f3fa4546a0d73dce63e3e41732bc7c14b4228ca0f77c3a27014d
-
Filesize
53KB
MD54d7cde615a0f534bd5e359951829554b
SHA1c885d00d9000f2a5dbc78f6193a052b36f4fe968
SHA256414fdf9bdcae5136c1295d6d24740c50a484acd81f1f7d0fb5d5c138607cb80a
SHA51233d632f9fbb694440a1ca568c90518784278efd1dc9ee2b57028149d56ebe1f7346d5b59dcfafee2eeaa10091dda05f48958e909d6bfc891e037ae1cfbd048d4