Overview
overview
5Static
static
3cru-1.5.2.zip
windows7-x64
1cru-1.5.2.zip
windows10-2004-x64
1CRU.exe
windows7-x64
1CRU.exe
windows10-2004-x64
1Info.txt
windows7-x64
1Info.txt
windows10-2004-x64
1reset-all.exe
windows7-x64
1reset-all.exe
windows10-2004-x64
1restart.exe
windows7-x64
4restart.exe
windows10-2004-x64
5restart64.exe
windows7-x64
4restart64.exe
windows10-2004-x64
5Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 21:32
Static task
static1
Behavioral task
behavioral1
Sample
cru-1.5.2.zip
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
cru-1.5.2.zip
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
CRU.exe
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
CRU.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Info.txt
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
Info.txt
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
reset-all.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
reset-all.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
restart.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
restart.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
restart64.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
restart64.exe
Resource
win10v2004-20240508-en
General
-
Target
restart64.exe
-
Size
73KB
-
MD5
297aa19bade534a791d053ca190b74ad
-
SHA1
15cb6a33994f75fe9e30a2afbc8a7e4616b63962
-
SHA256
5f779bb822aedaf5bd11693cdf73f6c7c3342f37371a78c07c2aca1e15dbfd00
-
SHA512
df883950c598f31b81f22a68b2a9fed7459dcad5084ec6e39399658b0492bcc458d9fc5bb80fda6bc994bed3241f969fc67a0b8e021fb82b040455d64776c625
-
SSDEEP
1536:8vXMJl7uRupZzidl/T+Dnx86Rpy4roKsIrryeq3OTM:8vMJl6RAZu/T+7x8qpRM8rNcOTM
Malware Config
Signatures
-
Drops file in Windows directory 3 IoCs
Processes:
restart64.exedescription ioc process File opened for modification C:\Windows\setuperr.log restart64.exe File opened for modification C:\Windows\INF\setupapi.app.log restart64.exe File opened for modification C:\Windows\setupact.log restart64.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
restart64.exedescription pid process Token: SeLoadDriverPrivilege 2184 restart64.exe Token: SeLoadDriverPrivilege 2184 restart64.exe