Analysis
-
max time kernel
156s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2024 01:32
Static task
static1
Behavioral task
behavioral1
Sample
ccc4daf8535a6396357fbc629b8d0dd2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ccc4daf8535a6396357fbc629b8d0dd2.exe
Resource
win10v2004-20240226-en
General
-
Target
ccc4daf8535a6396357fbc629b8d0dd2.exe
-
Size
49KB
-
MD5
ccc4daf8535a6396357fbc629b8d0dd2
-
SHA1
750986b0a5841f95ebb0bd1ab5ffe0802d99d25b
-
SHA256
95617afeddb10654725d3d94f14fb07eff170f625daa0d0e5d29f4aafdb04bf0
-
SHA512
d8144c893a79651327233791b2c3bd99f6c1c3f986d4669cbfafe81d7d08e43cf626902a63fbadd80b5015a03f9d7c13112ab90cf6867e562ade9e6504b06d7e
-
SSDEEP
1536:8HxpVW5KT0YfPSI/D3oJS8nuB56DWP7D2sah:adPSusJhnwEWPn2L
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List ccc4daf8535a6396357fbc629b8d0dd2.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile ccc4daf8535a6396357fbc629b8d0dd2.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications ccc4daf8535a6396357fbc629b8d0dd2.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\ccc4daf8535a6396357fbc629b8d0dd2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ccc4daf8535a6396357fbc629b8d0dd2.exe:*:Enabled:Windows Services" ccc4daf8535a6396357fbc629b8d0dd2.exe -
Executes dropped EXE 1 IoCs
pid Process 1760 csrs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Services = "csrs.exe" ccc4daf8535a6396357fbc629b8d0dd2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\csrs.exe ccc4daf8535a6396357fbc629b8d0dd2.exe File opened for modification C:\Windows\csrs.exe ccc4daf8535a6396357fbc629b8d0dd2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1760 csrs.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1280 wrote to memory of 1760 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 98 PID 1280 wrote to memory of 1760 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 98 PID 1280 wrote to memory of 1760 1280 ccc4daf8535a6396357fbc629b8d0dd2.exe 98 PID 1760 wrote to memory of 3164 1760 csrs.exe 56 PID 1760 wrote to memory of 3164 1760 csrs.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\ccc4daf8535a6396357fbc629b8d0dd2.exe"C:\Users\Admin\AppData\Local\Temp\ccc4daf8535a6396357fbc629b8d0dd2.exe"2⤵
- Modifies firewall policy service
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\csrs.exe"C:\Windows\csrs.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1760
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:2028
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5ccc4daf8535a6396357fbc629b8d0dd2
SHA1750986b0a5841f95ebb0bd1ab5ffe0802d99d25b
SHA25695617afeddb10654725d3d94f14fb07eff170f625daa0d0e5d29f4aafdb04bf0
SHA512d8144c893a79651327233791b2c3bd99f6c1c3f986d4669cbfafe81d7d08e43cf626902a63fbadd80b5015a03f9d7c13112ab90cf6867e562ade9e6504b06d7e