Analysis
-
max time kernel
18s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 20:33
Static task
static1
Behavioral task
behavioral1
Sample
3a59835da7aba7f406b645de60c73f716918efee16daecad05dd218bf37afa9c.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
3a59835da7aba7f406b645de60c73f716918efee16daecad05dd218bf37afa9c.exe
Resource
win10v2004-20240226-en
General
-
Target
3a59835da7aba7f406b645de60c73f716918efee16daecad05dd218bf37afa9c.exe
-
Size
308KB
-
MD5
4d3655038f4d70303d0c389daea90a1c
-
SHA1
b2de436860db40c2d2e47843c8c7ac0c30fdef68
-
SHA256
3a59835da7aba7f406b645de60c73f716918efee16daecad05dd218bf37afa9c
-
SHA512
2390602d01d55ed4adbf5d0a935ebb975221b4ae84994ad5f3b5b2dbf6dcc831bf0da24c5f1ab8c3f20a0acb2f2ec3559d609c98e34fb518615d21f80fa604fb
-
SSDEEP
3072:/c3sBG7mXh7m/zZM3jAbNOM6CNtDCZFL:E3sBz0Z4Mj72F
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 7 IoCs
Processes:
resource yara_rule behavioral1/memory/28284-73925-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/28284-73924-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/28284-73923-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/28284-73920-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/28284-147849-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/145204-147847-0x0000000000400000-0x0000000000414000-memory.dmp UPX behavioral1/memory/28284-147854-0x0000000000400000-0x000000000040B000-memory.dmp UPX -
Processes:
resource yara_rule behavioral1/memory/28284-73925-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/28284-73924-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/28284-73923-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/28284-73920-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/28284-73918-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/28284-147849-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/145204-147847-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/28284-147854-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
3a59835da7aba7f406b645de60c73f716918efee16daecad05dd218bf37afa9c.exepid process 2932 3a59835da7aba7f406b645de60c73f716918efee16daecad05dd218bf37afa9c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a59835da7aba7f406b645de60c73f716918efee16daecad05dd218bf37afa9c.exe"C:\Users\Admin\AppData\Local\Temp\3a59835da7aba7f406b645de60c73f716918efee16daecad05dd218bf37afa9c.exe"1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\3a59835da7aba7f406b645de60c73f716918efee16daecad05dd218bf37afa9c.exe"C:\Users\Admin\AppData\Local\Temp\3a59835da7aba7f406b645de60c73f716918efee16daecad05dd218bf37afa9c.exe"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\PFBXW.bat" "3⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Win Pdf" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe" /f4⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"3⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"4⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"4⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\PFBXW.batFilesize
145B
MD54eb61ec7816c34ec8c125acadc57ec1b
SHA1b0015cc865c0bb1a027be663027d3829401a31cc
SHA25608375cdb2e9819391f67f71e9718c15b48d3eaa452c54bd8fdd1f6a42e899aff
SHA512f289f01d996dd643560370be8cdf8894e9a676ca3813f706c01ef5d705b9b18246c6cadf10d96edd433a616637b8a78fbd23c5738e76f1c4e671977b6d0cb6c1
-
\Users\Admin\AppData\Roaming\Microsoft\csrsll.exeFilesize
308KB
MD5e603fe05a7c769a209e3e574fb2b79e6
SHA11813b99487b2d5fc69312eced1549742e9b9f9d8
SHA256a734277aca7c459f177ac57d2dd2cdf52c792673a5db55776b846433417ad097
SHA5120e97219e52845a7c2a99fa8bb8af3f0f12c4bffe7ebf0929679a1ffc13e7a667fc1a0ee4fd64aa9c3eab6b9833951ff3e0d8542e6910c85e189914dcf47c1968
-
memory/2932-51059-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51079-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51081-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51058-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51077-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51076-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51074-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51073-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51072-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51071-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51070-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51069-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51068-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51066-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51065-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51057-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51063-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51062-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51061-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51060-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-0-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2932-51082-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51064-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51056-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51054-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51053-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51052-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51078-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51075-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51067-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-51055-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/2932-3-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/2932-51080-0x0000000000090000-0x0000000000190000-memory.dmpFilesize
1024KB
-
memory/28284-73923-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/28284-73922-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/28284-73920-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/28284-73918-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/28284-73916-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/28284-73924-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/28284-73925-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/28284-147849-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/28284-147854-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/145204-147847-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB