Resubmissions
17/04/2024, 08:52
240417-ksyeyaac95 1017/04/2024, 08:52
240417-ksx46sac94 817/04/2024, 08:52
240417-ksxhmsac92 1017/04/2024, 08:52
240417-ksww4sac89 1017/04/2024, 08:52
240417-kswaksac87 1016/04/2024, 13:49
240416-q4ysqsdb6w 10Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 08:52
Static task
static1
Behavioral task
behavioral1
Sample
0899f861216a0a19c1d76624980ce1b1053b1ad3984b1a4d6e7eb0e95ace3c37.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
0899f861216a0a19c1d76624980ce1b1053b1ad3984b1a4d6e7eb0e95ace3c37.exe
Resource
win7-20231129-en
Behavioral task
behavioral3
Sample
0899f861216a0a19c1d76624980ce1b1053b1ad3984b1a4d6e7eb0e95ace3c37.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
0899f861216a0a19c1d76624980ce1b1053b1ad3984b1a4d6e7eb0e95ace3c37.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
0899f861216a0a19c1d76624980ce1b1053b1ad3984b1a4d6e7eb0e95ace3c37.exe
Resource
win11-20240412-en
General
-
Target
0899f861216a0a19c1d76624980ce1b1053b1ad3984b1a4d6e7eb0e95ace3c37.exe
-
Size
1.9MB
-
MD5
3b1eaf69697336c389c2f4b91c7782f4
-
SHA1
c7649995e194921ed2ba31e27afbbbeec7fe3fe0
-
SHA256
0899f861216a0a19c1d76624980ce1b1053b1ad3984b1a4d6e7eb0e95ace3c37
-
SHA512
a29a22bbb837e4ec24123b58efac03da7cfac7cd106d53c8a729fff8630149ae83f05dc961d864d850cc0dd4bf66a26155d904fd1f3858401d3134f130f1393e
-
SSDEEP
49152:NA7mBr8JPxDH2XydxRY/5bdN7QQ8BWyX:OU8bDsYihoB
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2036-5-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-7-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-8-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-9-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-10-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-11-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-16-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-35-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-36-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-38-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-44-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-48-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-49-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-52-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-56-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-57-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-58-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-59-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-60-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-61-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-63-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-65-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-67-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-69-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-71-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-73-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-75-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-78-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-85-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-87-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-86-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-91-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-94-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-92-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-100-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-102-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-104-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-93-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-89-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2036-76-0x0000000000400000-0x0000000000848000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CSRSS = "\"C:\\ProgramData\\Drivers\\csrss.exe\"" 0899f861216a0a19c1d76624980ce1b1053b1ad3984b1a4d6e7eb0e95ace3c37.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2232 set thread context of 2036 2232 0899f861216a0a19c1d76624980ce1b1053b1ad3984b1a4d6e7eb0e95ace3c37.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2036 0899f861216a0a19c1d76624980ce1b1053b1ad3984b1a4d6e7eb0e95ace3c37.exe 2036 0899f861216a0a19c1d76624980ce1b1053b1ad3984b1a4d6e7eb0e95ace3c37.exe 2036 0899f861216a0a19c1d76624980ce1b1053b1ad3984b1a4d6e7eb0e95ace3c37.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2036 2232 0899f861216a0a19c1d76624980ce1b1053b1ad3984b1a4d6e7eb0e95ace3c37.exe 28 PID 2232 wrote to memory of 2036 2232 0899f861216a0a19c1d76624980ce1b1053b1ad3984b1a4d6e7eb0e95ace3c37.exe 28 PID 2232 wrote to memory of 2036 2232 0899f861216a0a19c1d76624980ce1b1053b1ad3984b1a4d6e7eb0e95ace3c37.exe 28 PID 2232 wrote to memory of 2036 2232 0899f861216a0a19c1d76624980ce1b1053b1ad3984b1a4d6e7eb0e95ace3c37.exe 28 PID 2232 wrote to memory of 2036 2232 0899f861216a0a19c1d76624980ce1b1053b1ad3984b1a4d6e7eb0e95ace3c37.exe 28 PID 2232 wrote to memory of 2036 2232 0899f861216a0a19c1d76624980ce1b1053b1ad3984b1a4d6e7eb0e95ace3c37.exe 28 PID 2232 wrote to memory of 2036 2232 0899f861216a0a19c1d76624980ce1b1053b1ad3984b1a4d6e7eb0e95ace3c37.exe 28 PID 2232 wrote to memory of 2036 2232 0899f861216a0a19c1d76624980ce1b1053b1ad3984b1a4d6e7eb0e95ace3c37.exe 28 PID 2232 wrote to memory of 2036 2232 0899f861216a0a19c1d76624980ce1b1053b1ad3984b1a4d6e7eb0e95ace3c37.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0899f861216a0a19c1d76624980ce1b1053b1ad3984b1a4d6e7eb0e95ace3c37.exe"C:\Users\Admin\AppData\Local\Temp\0899f861216a0a19c1d76624980ce1b1053b1ad3984b1a4d6e7eb0e95ace3c37.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\0899f861216a0a19c1d76624980ce1b1053b1ad3984b1a4d6e7eb0e95ace3c37.exe"C:\Users\Admin\AppData\Local\Temp\0899f861216a0a19c1d76624980ce1b1053b1ad3984b1a4d6e7eb0e95ace3c37.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5436dd6d783d1a7df93340f95d7c87477
SHA1a525248aca4453f479b86efe8baa4abbb932f7ee
SHA2565704c943f7962001efb2a33a8b3e2f2413fd61589f2b628eaeb45a84e85fb702
SHA5122fd4bd221e6c518b8eae2d00484bd6dee391d99e5acc9079247139493d08ebe6b01c07271cf223b4a78f7af1f42587dce78f08ce8d54515ffa2b8c709bc96658
-
Filesize
12.2MB
MD52a7c888928fba6b0f847b05a63c52174
SHA1e230cda117d9b6773668660ca9df8af52bfc8599
SHA2563dfbb3af2b2b01626e402ca51b7976d256c22021257e84d9f81cc2dc2cc05d40
SHA512e6cc97cbf1ed5235d9fe47defbf6b371308da72d030df6564f72d6d086e30b511b706265deaf49603372e4b273157b2563bcd8f9edffebc56999df939a0ca3c9