Resubmissions
09/04/2024, 10:06
240409-l5bmdacc75 709/04/2024, 10:05
240409-l4pgvacc66 709/04/2024, 10:05
240409-l4nwbacc65 1009/04/2024, 10:05
240409-l4m9safe9x 1029/01/2024, 04:54
240129-fjkehaaec3 8Analysis
-
max time kernel
293s -
max time network
305s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
09/04/2024, 10:06
Static task
static1
Behavioral task
behavioral1
Sample
8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe
Resource
win11-20240221-en
General
-
Target
8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe
-
Size
1.9MB
-
MD5
d5057eda9b4251e0e52fb2d8524cfa57
-
SHA1
327f6d72563fdfb1ab206ac9a3b2d4c770d066f5
-
SHA256
8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91
-
SHA512
24d423aa3d71b12af016c5918940d4984f1640f902dc36adc9a29dd9980baa2210ea250111b052dc9fdc5cdfbea8ece8813494f2d2ccecefa60f224a3d731fb2
-
SSDEEP
24576:OPUnujryKC12iAlGaRctykklEPjJ3QIzs6yBKSolGIUOVPgJAt8EnZapKtpMh6co:9Dr2iAcKcC+N3Bs6ywSz5SSAza88hqx
Malware Config
Signatures
-
resource yara_rule behavioral4/memory/124-3-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-5-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-6-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-7-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-8-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-9-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-14-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-15-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-16-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-17-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-34-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-36-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-49-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-53-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-57-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-58-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-59-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-63-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-64-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-65-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-66-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-67-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-71-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-72-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-73-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-74-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-75-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-79-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-80-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-81-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-82-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-83-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-87-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-88-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-89-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral4/memory/124-96-0x0000000000400000-0x0000000000848000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CSRSS = "\"C:\\ProgramData\\Drivers\\csrss.exe\"" 8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2092 set thread context of 124 2092 8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe 79 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 124 8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe 124 8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe 124 8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe 124 8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe 124 8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe 124 8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2092 wrote to memory of 124 2092 8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe 79 PID 2092 wrote to memory of 124 2092 8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe 79 PID 2092 wrote to memory of 124 2092 8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe 79 PID 2092 wrote to memory of 124 2092 8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe 79 PID 2092 wrote to memory of 124 2092 8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe 79 PID 2092 wrote to memory of 124 2092 8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe 79 PID 2092 wrote to memory of 124 2092 8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe 79 PID 2092 wrote to memory of 124 2092 8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe"C:\Users\Admin\AppData\Local\Temp\8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe"C:\Users\Admin\AppData\Local\Temp\8a531865aa5785bb7b20574bb347744a5d83cf8719c6809217402b4fa5fbde91.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD521112c87b4bb2b0bb8004c1f1653d36e
SHA131aed7e1843c4cc528931710ba578f909e71d764
SHA256556b87267249b63a0e4ab4e0afd7924e88f72e036c55c1e18c40c7889762449c
SHA512b95c5603d090c79c8e67bd8f6f5cedffd2d0c5b1d453489d99733997ff2722d83a138c925790ed4341d61756f859ff5523ef54674553b6602b730a7042eccb2f
-
Filesize
10.2MB
MD59c5846959e6f48c287a3a004256c310e
SHA119be9c64cf0548b3f73e9082bedf9e0e967d4848
SHA256076601d40af7ea3500daff9167ba1b8001613e296c7ebfef88074d26e7d74d35
SHA5121da7f958a5e0997980c0d66d037f7ec9dd3d665213d9d99af6642df8518b10123f17288f0248182238f8f709a4e3651acf9cc5459ad8ae36ff1903ce69ac6756