Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 13:16
Static task
static1
Behavioral task
behavioral1
Sample
96f1c775ee491b26a4c116033aa310f1b52a8a861085bdf8d24dfd5fc99bbca2.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral2
Sample
96f1c775ee491b26a4c116033aa310f1b52a8a861085bdf8d24dfd5fc99bbca2.exe
Resource
win11-20240419-en
General
-
Target
96f1c775ee491b26a4c116033aa310f1b52a8a861085bdf8d24dfd5fc99bbca2.exe
-
Size
1.9MB
-
MD5
1b5058c908a0644e00c5d4cffadc848b
-
SHA1
fb82054dc5a2063b279487556888c7d50f258cd1
-
SHA256
96f1c775ee491b26a4c116033aa310f1b52a8a861085bdf8d24dfd5fc99bbca2
-
SHA512
70ed4fc7f8b40c5e39ee593359f93ffdbc1494e87ec6fc21eb9615581be9c38f307098ebcecf8fcf61e9b14b92649603debbdc382a8901e9ee7b0183c70b4873
-
SSDEEP
49152:SzR0AzPFO8AIlpFyl9aQ6r6p5Dp/+4sLcO9dx:CCAzPTG9a6jR+x9dx
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3416-1-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-4-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-7-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-6-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-3-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-8-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-9-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-22-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-23-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-25-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-31-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-35-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-36-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-37-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-40-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-50-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-51-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-52-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-56-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-57-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-61-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-66-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-64-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-62-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-104-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-105-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-107-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-106-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-102-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/3416-100-0x0000000000400000-0x0000000000848000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CSRSS = "\"C:\\ProgramData\\Drivers\\csrss.exe\"" 96f1c775ee491b26a4c116033aa310f1b52a8a861085bdf8d24dfd5fc99bbca2.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1748 set thread context of 3416 1748 96f1c775ee491b26a4c116033aa310f1b52a8a861085bdf8d24dfd5fc99bbca2.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3416 96f1c775ee491b26a4c116033aa310f1b52a8a861085bdf8d24dfd5fc99bbca2.exe 3416 96f1c775ee491b26a4c116033aa310f1b52a8a861085bdf8d24dfd5fc99bbca2.exe 3416 96f1c775ee491b26a4c116033aa310f1b52a8a861085bdf8d24dfd5fc99bbca2.exe 3416 96f1c775ee491b26a4c116033aa310f1b52a8a861085bdf8d24dfd5fc99bbca2.exe 3416 96f1c775ee491b26a4c116033aa310f1b52a8a861085bdf8d24dfd5fc99bbca2.exe 3416 96f1c775ee491b26a4c116033aa310f1b52a8a861085bdf8d24dfd5fc99bbca2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1748 wrote to memory of 3416 1748 96f1c775ee491b26a4c116033aa310f1b52a8a861085bdf8d24dfd5fc99bbca2.exe 84 PID 1748 wrote to memory of 3416 1748 96f1c775ee491b26a4c116033aa310f1b52a8a861085bdf8d24dfd5fc99bbca2.exe 84 PID 1748 wrote to memory of 3416 1748 96f1c775ee491b26a4c116033aa310f1b52a8a861085bdf8d24dfd5fc99bbca2.exe 84 PID 1748 wrote to memory of 3416 1748 96f1c775ee491b26a4c116033aa310f1b52a8a861085bdf8d24dfd5fc99bbca2.exe 84 PID 1748 wrote to memory of 3416 1748 96f1c775ee491b26a4c116033aa310f1b52a8a861085bdf8d24dfd5fc99bbca2.exe 84 PID 1748 wrote to memory of 3416 1748 96f1c775ee491b26a4c116033aa310f1b52a8a861085bdf8d24dfd5fc99bbca2.exe 84 PID 1748 wrote to memory of 3416 1748 96f1c775ee491b26a4c116033aa310f1b52a8a861085bdf8d24dfd5fc99bbca2.exe 84 PID 1748 wrote to memory of 3416 1748 96f1c775ee491b26a4c116033aa310f1b52a8a861085bdf8d24dfd5fc99bbca2.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\96f1c775ee491b26a4c116033aa310f1b52a8a861085bdf8d24dfd5fc99bbca2.exe"C:\Users\Admin\AppData\Local\Temp\96f1c775ee491b26a4c116033aa310f1b52a8a861085bdf8d24dfd5fc99bbca2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\96f1c775ee491b26a4c116033aa310f1b52a8a861085bdf8d24dfd5fc99bbca2.exe"C:\Users\Admin\AppData\Local\Temp\96f1c775ee491b26a4c116033aa310f1b52a8a861085bdf8d24dfd5fc99bbca2.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:3416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD58b81b9a8ccb2f0ff0ef948aaf107371e
SHA19f7067b584911a3abdefdaea3d970bcb9e05f920
SHA25698ffa9adefb64de74ae8992e0ac65b91ee2e98e71289aa4fdd49b914d92af740
SHA512c82ce33f478ff669f6fbc05cc9cbdcb3affcd0381d993fcc29cd586c622fb0d735ef568023951b99ba673d225c04fc333e728d774ac6f81852bc564c30d3d9eb
-
Filesize
7.1MB
MD504fc139b1a0e3b62452f015e57def9b1
SHA1c381ebed08b8e0f23eb4f5d21c77d9cbd7637628
SHA2566095e1280a7c35c121f6813fc01906a731ad9802af44ad69ccd780298d1ad1d3
SHA51211892939ab9b3f61aec7286dd2f5eda1339f9bbf8cc014953ef06951867ee53b4f016b48ecdf8245474016a938752d4f1cbd461cfbe2af9975db7d288dcf418c