Resubmissions
26/04/2024, 07:57
240426-jtn28acb7z 726/04/2024, 07:57
240426-jtm5xscc35 726/04/2024, 07:57
240426-jtmjdscc34 726/04/2024, 07:57
240426-jtlxvscc33 726/04/2024, 07:57
240426-jtll4acc32 725/04/2024, 13:12
240425-qff8saba5x 8Analysis
-
max time kernel
1192s -
max time network
1199s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/04/2024, 07:57
Static task
static1
Behavioral task
behavioral1
Sample
bf711a804180be42b3e783997bc96c0b57e55a84c8fb9c91b8f85356d16d66a6.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
bf711a804180be42b3e783997bc96c0b57e55a84c8fb9c91b8f85356d16d66a6.exe
Resource
win7-20231129-en
Behavioral task
behavioral3
Sample
bf711a804180be42b3e783997bc96c0b57e55a84c8fb9c91b8f85356d16d66a6.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
bf711a804180be42b3e783997bc96c0b57e55a84c8fb9c91b8f85356d16d66a6.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
bf711a804180be42b3e783997bc96c0b57e55a84c8fb9c91b8f85356d16d66a6.exe
Resource
win11-20240412-en
General
-
Target
bf711a804180be42b3e783997bc96c0b57e55a84c8fb9c91b8f85356d16d66a6.exe
-
Size
1.8MB
-
MD5
a5373af0c48a42a8ba50434e68766ba9
-
SHA1
40e532e24c32a1f68d127f0598c96cf5e03af00f
-
SHA256
bf711a804180be42b3e783997bc96c0b57e55a84c8fb9c91b8f85356d16d66a6
-
SHA512
a526c9d6797af5c6071bfb60b0b9cc540e08ac7af9ac16d977dd86bfd81e3013fb6cf763f3397b8be3d03ac02013045d2761c956c4687b270e105fd2b2065ebf
-
SSDEEP
49152:lsE6hiwv8oNhqbOpn1jJz5eRY4YSl+COVA:G1hF1CkFwRY4YSkCO
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2108-3-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-8-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-4-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-9-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-11-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-10-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-27-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-28-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-29-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-30-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-32-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-36-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-37-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-40-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-48-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-56-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-57-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-58-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-62-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-63-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-64-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-68-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-69-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-70-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-71-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-75-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-76-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-77-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-78-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-79-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-80-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-84-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-85-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-86-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-87-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-88-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-89-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-90-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-94-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-95-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-96-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-97-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-101-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-102-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-106-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-107-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-108-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-109-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-113-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-114-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-115-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-119-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-120-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-121-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-122-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-123-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-124-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-128-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-129-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-130-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-134-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-135-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-136-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/2108-140-0x0000000000400000-0x0000000000848000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CSRSS = "\"C:\\ProgramData\\Drivers\\csrss.exe\"" bf711a804180be42b3e783997bc96c0b57e55a84c8fb9c91b8f85356d16d66a6.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3048 set thread context of 2108 3048 bf711a804180be42b3e783997bc96c0b57e55a84c8fb9c91b8f85356d16d66a6.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2108 bf711a804180be42b3e783997bc96c0b57e55a84c8fb9c91b8f85356d16d66a6.exe 2108 bf711a804180be42b3e783997bc96c0b57e55a84c8fb9c91b8f85356d16d66a6.exe 2108 bf711a804180be42b3e783997bc96c0b57e55a84c8fb9c91b8f85356d16d66a6.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2108 3048 bf711a804180be42b3e783997bc96c0b57e55a84c8fb9c91b8f85356d16d66a6.exe 28 PID 3048 wrote to memory of 2108 3048 bf711a804180be42b3e783997bc96c0b57e55a84c8fb9c91b8f85356d16d66a6.exe 28 PID 3048 wrote to memory of 2108 3048 bf711a804180be42b3e783997bc96c0b57e55a84c8fb9c91b8f85356d16d66a6.exe 28 PID 3048 wrote to memory of 2108 3048 bf711a804180be42b3e783997bc96c0b57e55a84c8fb9c91b8f85356d16d66a6.exe 28 PID 3048 wrote to memory of 2108 3048 bf711a804180be42b3e783997bc96c0b57e55a84c8fb9c91b8f85356d16d66a6.exe 28 PID 3048 wrote to memory of 2108 3048 bf711a804180be42b3e783997bc96c0b57e55a84c8fb9c91b8f85356d16d66a6.exe 28 PID 3048 wrote to memory of 2108 3048 bf711a804180be42b3e783997bc96c0b57e55a84c8fb9c91b8f85356d16d66a6.exe 28 PID 3048 wrote to memory of 2108 3048 bf711a804180be42b3e783997bc96c0b57e55a84c8fb9c91b8f85356d16d66a6.exe 28 PID 3048 wrote to memory of 2108 3048 bf711a804180be42b3e783997bc96c0b57e55a84c8fb9c91b8f85356d16d66a6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf711a804180be42b3e783997bc96c0b57e55a84c8fb9c91b8f85356d16d66a6.exe"C:\Users\Admin\AppData\Local\Temp\bf711a804180be42b3e783997bc96c0b57e55a84c8fb9c91b8f85356d16d66a6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\bf711a804180be42b3e783997bc96c0b57e55a84c8fb9c91b8f85356d16d66a6.exe"C:\Users\Admin\AppData\Local\Temp\bf711a804180be42b3e783997bc96c0b57e55a84c8fb9c91b8f85356d16d66a6.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD572b9fd75f34c5bd6a42cb6d59df73908
SHA1e7f78566af114217bba2cdbc9481fd878808dea6
SHA2561ea9e7568b8da6e7e1d3aee7e138589cadec89773fddb27c993c95aea40b474b
SHA51238af11ab7e522dcae5d8f0d99c99d439ee2ab007b6c4622370c4ef31d1f8a182262d126e4ac1a0c335605391d5fcea41809ec78af64e55bbea50a9560851807a
-
Filesize
6.9MB
MD50487e00714aa24813f3f2c51931d80a7
SHA168df63b44dd18c0ba973e17390fb8213c12d1b3e
SHA25605662cd38387b96599d05c43b7f786edfe82897100522e02bcb6a56808728846
SHA512e04dc74111ea77c054a1d98672a1cbd10a66a7b97e38fa46b2072609b0cbd6ce041bd3d6b5c92865f6e6d64d9c72660935f10c322fc5e62dc74987064bb631f7