Resubmissions
31/03/2025, 05:32
250331-f8mk6atxfv 329/03/2025, 20:24
250329-y659lasxbx 1029/03/2025, 20:22
250329-y5ncdsstd1 3Analysis
-
max time kernel
101s -
max time network
104s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
29/03/2025, 20:22
Static task
static1
Behavioral task
behavioral1
Sample
BlsCrn.exe
Resource
win11-20250313-en
General
-
Target
BlsCrn.exe
-
Size
68KB
-
MD5
8d126e89c071719bc4b36f4551024ab5
-
SHA1
e0b3bb8de47da697f029242fe45f0f861c2f4867
-
SHA256
c75462e36e1a9b989cf0a0330219667d463daa7e51666ac069046969cacaaa1f
-
SHA512
e8637e1eae28ebdfdedd2cc0027a431cae601df154f8dbd0035db5c262402038c6d592b61662dbd537c42b54a56a14812f5046f5090c2c645fd6c18d889ffe49
-
SSDEEP
384:2mvY5+dSd+cagoEb/S7sGEHeTS+yTifPQC4ItobbxW+e0ewd0SyrQfBkJ5hZf6CZ:2F5urgNOyWYCGwSVB2hZPA69km
Malware Config
Signatures
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2081498128-3109241912-2948996266-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1944 MiniSearchHost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BlsCrn.exe"C:\Users\Admin\AppData\Local\Temp\BlsCrn.exe"1⤵PID:2628
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1944
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3388
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize23KB
MD51dbfc15d60c8a84a92c503d69f002e6f
SHA190aa4deaa542004a72c27fc0977ed8de710fad00
SHA25679393d824289ec314ca41edd8a34b91c8e895b7bc81c547453cd725f708c4db7
SHA5125db121a85ab6c0ba3c3383c85cbccc5070e62c97a061fa644da75b64f1c298681ba61fc721df200365ec46024d51624230ff47aba758ca58208fdd6173d26231