Resubmissions
11/04/2024, 07:38
240411-jgeysahh8y 711/04/2024, 07:37
240411-jfzlsshh7z 1011/04/2024, 07:37
240411-jfyz9shh7y 1011/04/2024, 07:36
240411-jfqnwseg78 711/04/2024, 07:36
240411-jfp3cshh7t 707/04/2024, 09:41
240407-ln9g3sad85 707/04/2024, 09:41
240407-ln4a3aad82 707/04/2024, 09:41
240407-lnxhhsad77 707/04/2024, 09:41
240407-lnq1qsad73 7Analysis
-
max time kernel
291s -
max time network
297s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
07/04/2024, 09:41
Static task
static1
Behavioral task
behavioral1
Sample
39d11a7c0c4286ab2fa318d37cb3c3f3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
39d11a7c0c4286ab2fa318d37cb3c3f3.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
39d11a7c0c4286ab2fa318d37cb3c3f3.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
39d11a7c0c4286ab2fa318d37cb3c3f3.exe
Resource
win11-20240319-en
General
-
Target
39d11a7c0c4286ab2fa318d37cb3c3f3.exe
-
Size
1.9MB
-
MD5
39d11a7c0c4286ab2fa318d37cb3c3f3
-
SHA1
c18444d8d82b628100ac6d7b33c873884be99897
-
SHA256
48ee5e003fdd3d8c6b50ffb7931e5562ef3d04b7b411d8cf89118655da5c0e03
-
SHA512
3b24266cfda84af111551bb35111b1816739ffb971ee9ed26f20d3463abb7e7cc7f301bd29b0fed9f68b40a2e43e8b8fbb3c3776f3ea78eb875e0327f52d5a10
-
SSDEEP
49152:CeZz2gwNjPDGrcflSdRwwlM2oTPHUcmdfgL:hQg0iyqwwlJyLmB
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4776-1-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-4-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-5-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-6-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-7-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-8-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-22-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-38-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-39-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-43-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-44-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-45-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-49-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-52-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-53-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-54-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-55-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-59-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-60-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-61-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-62-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-63-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-64-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-65-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-66-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-67-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-68-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-69-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-70-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-74-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-75-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-79-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-80-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-81-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-82-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/4776-83-0x0000000000400000-0x0000000000848000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CSRSS = "\"C:\\ProgramData\\Drivers\\csrss.exe\"" 39d11a7c0c4286ab2fa318d37cb3c3f3.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4764 set thread context of 4776 4764 39d11a7c0c4286ab2fa318d37cb3c3f3.exe 73 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4776 39d11a7c0c4286ab2fa318d37cb3c3f3.exe 4776 39d11a7c0c4286ab2fa318d37cb3c3f3.exe 4776 39d11a7c0c4286ab2fa318d37cb3c3f3.exe 4776 39d11a7c0c4286ab2fa318d37cb3c3f3.exe 4776 39d11a7c0c4286ab2fa318d37cb3c3f3.exe 4776 39d11a7c0c4286ab2fa318d37cb3c3f3.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4764 wrote to memory of 4776 4764 39d11a7c0c4286ab2fa318d37cb3c3f3.exe 73 PID 4764 wrote to memory of 4776 4764 39d11a7c0c4286ab2fa318d37cb3c3f3.exe 73 PID 4764 wrote to memory of 4776 4764 39d11a7c0c4286ab2fa318d37cb3c3f3.exe 73 PID 4764 wrote to memory of 4776 4764 39d11a7c0c4286ab2fa318d37cb3c3f3.exe 73 PID 4764 wrote to memory of 4776 4764 39d11a7c0c4286ab2fa318d37cb3c3f3.exe 73 PID 4764 wrote to memory of 4776 4764 39d11a7c0c4286ab2fa318d37cb3c3f3.exe 73 PID 4764 wrote to memory of 4776 4764 39d11a7c0c4286ab2fa318d37cb3c3f3.exe 73 PID 4764 wrote to memory of 4776 4764 39d11a7c0c4286ab2fa318d37cb3c3f3.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\39d11a7c0c4286ab2fa318d37cb3c3f3.exe"C:\Users\Admin\AppData\Local\Temp\39d11a7c0c4286ab2fa318d37cb3c3f3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\39d11a7c0c4286ab2fa318d37cb3c3f3.exe"C:\Users\Admin\AppData\Local\Temp\39d11a7c0c4286ab2fa318d37cb3c3f3.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD54d62003ad34c5d7a6f806d8849ce9e97
SHA1a08a271fd0114c10f82ff161959095d89c0bf482
SHA25659838a713e970480f142eaed3df312d8aa9c707a021e5ff5dbfb86baebc9698e
SHA5126b8517a14dba98c1a7ca3556d383c603ac5062b0f076473c6a9f92e38c8f3d657076be299959aaae03628daef19a68e74a3d92d5dc66269b1e5ce1f83ff2a3fe
-
Filesize
10.4MB
MD508a6207e21f07e31dbdc4de95f64dd01
SHA13705fb57c4ac24b382b69c5c090bc2c5e607db2f
SHA256a1efcf7042d779371d261fafbddc5dc1f3f9e7a60a47101508606626f1b35d83
SHA5125d56c633e976381bb1609ae321fa9a68e1a7ff1870b17a1e2358de9aeb58cca033e3f9f506a8ec05cc4c44d7caf13f7e164bed11f987848c93eeaafcac98b9c1