Overview
overview
10Static
static
6D02D012970...94.exe
windows7-x64
1DBm0yQwt.exe.ViR.exe
windows7-x64
10ca6ec46ee9...52.apk
windows7-x64
3calc.exe
windows7-x64
7ccc71c83c8...B3.exe
windows7-x64
7ccc71c83c8...68.exe
windows7-x64
7cd2d085998...-0.dll
windows7-x64
8cdffb7e75b...ss.exe
windows7-x64
3cf7382c25a...c9.exe
windows7-x64
6cgi19-alpt...e_.exe
windows7-x64
7chrst.exe
windows7-x64
3ci05l2a.exe
windows7-x64
cl.exe
windows7-x64
7clean.exe
windows7-x64
3coinvault.exe
windows7-x64
9com_loader.exe
windows7-x64
3csrss.ex_.exe
windows7-x64
6d.exe
windows7-x64
3d0a5cfec8e...B3.exe
windows7-x64
7d0a5cfec8e...A6.exe
windows7-x64
7d2164cdbc9...FB.exe
windows7-x64
3d2164cdbc9...08.exe
windows7-x64
7d4439055d2..._1.dll
windows7-x64
3d54d2a216e...96.exe
windows7-x64
7d5f29750a8...c5.apk
windows7-x64
3d6c32b0146...4d.zip
windows7-x64
9d889734783...48.exe
windows7-x64
daaa72f48b...2d.exe
windows7-x64
9ddbf1840bf...e2.exe
windows7-x64
10de882c049b..._3.dll
windows7-x64
3decrypt.exe
windows7-x64
3decrypted.ex_.exe
windows7-x64
6Analysis
-
max time kernel
291s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 03:21
Behavioral task
behavioral1
Sample
D02D012970AA164CAD15C757D7E52994.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DBm0yQwt.exe.ViR.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
ca6ec46ee9435a4745fd3a03267f051dc64540dd348f127bb33e9675dadd3d52.apk
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
calc.exe
Resource
win7-20241010-en
Behavioral task
behavioral5
Sample
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2_Dumped_TDS=4F9911B3.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2_TDS=4FAD9768.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
cd2d085998a289134ffaf27fbdcbc8cb_api-ms-win-system-dispex-l1-1-0.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
cdffb7e75b20eeae4db75c9962c17b3be980a719f7597e8b11a747d72c975a36_not_packed_maybe_useless.exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
cgi19-alptsevs-h555.exe_.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
chrst.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
ci05l2a.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
cl.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
clean.exe
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
coinvault.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
com_loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
csrss.ex_.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
d.exe
Resource
win7-20240729-en
Behavioral task
behavioral19
Sample
d0a5cfec8e80622b3e194b5ee03e93d78c7ef3478bead6a039d213caaaa58523_Dumped_TDS=4F9911B3.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
d0a5cfec8e80622b3e194b5ee03e93d78c7ef3478bead6a039d213caaaa58523_TDS=4FA478A6.exe
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
d2164cdbc9c78db0115f382a139ccd758f8a25ebfc5ab3e0034e7aef0fe0b6b4_Dumped_TDS=4FB252FB.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
d2164cdbc9c78db0115f382a139ccd758f8a25ebfc5ab3e0034e7aef0fe0b6b4_TDS=4FB30D08.exe
Resource
win7-20241023-en
Behavioral task
behavioral23
Sample
d4439055d2d63e52ffc23c6d24d89194_86e510605f1ee068bdc1ae306312652a__1.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
d54d2a216e637bcd36e5217cfba98896.exe
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
d5f29750a8cb158d9b89a1e02e8addc5e410d1ddc48e660589144ade47f794c5.apk
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
d6c32b0146f219bdcb5cf524ea9e0047d9b9bd0fd7c395d5b11cbc4c3298824d.zip
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
d889734783273b7158deeae6cf804a6be99c3a5353d94225a4dbe92caf3a3d48.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
daaa72f48bea498c5ac7ce9bc315e585ff11dad04d1eeb0d1b0ce33a28bedf2d.exe
Resource
win7-20240729-en
Behavioral task
behavioral29
Sample
ddbf1840bf626da19d8f3467fe9e20e2.exe
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
de882c049be133a950b6917562bb2313_583a76e23c1998307d702709dadbe103__3.dll
Resource
win7-20240708-en
Behavioral task
behavioral31
Sample
decrypt.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
decrypted.ex_.exe
Resource
win7-20240903-en
General
-
Target
csrss.ex_.exe
-
Size
892KB
-
MD5
d1217c81cca33f5fcc4bed6cd948a36b
-
SHA1
b1a299b2e29141618fd8ee1eba33f46dcbaa3f0a
-
SHA256
d460e5870a252c2827b88fdfc651a033a5d5875770f21a23b476a36e56ad5a8e
-
SHA512
bd63a2a187e5fba3691933b3eef02e86a09efd07d18c68dc1e372f9f848655ef4fffd930c5df6cc1f1ec10f66d424595c22866b74aa4d3688998c6c7013b897b
-
SSDEEP
24576:zdRpOBhPImfR23aAHRdY2Eq2htqgQdsmGDs2SZ:5R0BtoqAHnvEvhcVGDs
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" csrss.ex_.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2492 set thread context of 1572 2492 csrss.ex_.exe 30 -
resource yara_rule behavioral17/memory/1572-11-0x0000000000400000-0x0000000001400000-memory.dmp upx behavioral17/memory/1572-5-0x0000000000400000-0x0000000001400000-memory.dmp upx behavioral17/memory/1572-14-0x0000000000400000-0x0000000001400000-memory.dmp upx behavioral17/memory/1572-9-0x0000000000400000-0x0000000001400000-memory.dmp upx behavioral17/memory/1572-6-0x0000000000400000-0x0000000001400000-memory.dmp upx behavioral17/memory/1572-16-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-15-0x0000000000400000-0x0000000001400000-memory.dmp upx behavioral17/memory/1572-17-0x0000000000400000-0x0000000001400000-memory.dmp upx behavioral17/memory/1572-18-0x0000000000400000-0x0000000001400000-memory.dmp upx behavioral17/memory/1572-19-0x0000000000400000-0x0000000001400000-memory.dmp upx behavioral17/memory/1572-23-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-24-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-25-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-26-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-27-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-28-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-29-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-32-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-33-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-34-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-35-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-36-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-37-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-38-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-39-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-40-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-41-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-42-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-43-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-44-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-45-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-46-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-47-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-48-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-49-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-50-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-51-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-52-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-53-0x0000000000400000-0x00000000005D5000-memory.dmp upx behavioral17/memory/1572-54-0x0000000000400000-0x00000000005D5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.ex_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.ex_.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2492 csrss.ex_.exe 1572 csrss.ex_.exe 1572 csrss.ex_.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2492 csrss.ex_.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2492 wrote to memory of 1572 2492 csrss.ex_.exe 30 PID 2492 wrote to memory of 1572 2492 csrss.ex_.exe 30 PID 2492 wrote to memory of 1572 2492 csrss.ex_.exe 30 PID 2492 wrote to memory of 1572 2492 csrss.ex_.exe 30 PID 2492 wrote to memory of 1572 2492 csrss.ex_.exe 30 PID 2492 wrote to memory of 1572 2492 csrss.ex_.exe 30 PID 2492 wrote to memory of 1572 2492 csrss.ex_.exe 30 PID 2492 wrote to memory of 1572 2492 csrss.ex_.exe 30 PID 2492 wrote to memory of 1572 2492 csrss.ex_.exe 30 PID 2492 wrote to memory of 1572 2492 csrss.ex_.exe 30 PID 2492 wrote to memory of 1572 2492 csrss.ex_.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\csrss.ex_.exe"C:\Users\Admin\AppData\Local\Temp\csrss.ex_.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\csrss.ex_.exeC:\Users\Admin\AppData\Local\Temp\csrss.ex_.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1572
-