Analysis

  • max time kernel
    3s
  • max time network
    5s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    08-11-2020 04:00

Errors

Reason
Machine shutdown

General

  • Target

    02ae530ebb33ee8528ac0b9061d41216d3f3d4dcd8e9b0fe7f7cd0511247b7df.exe

  • Size

    54KB

  • MD5

    cdb6e431b4eeb2909b1cf198f70ae444

  • SHA1

    98205803babd17587e99913934eb6975c3dc8779

  • SHA256

    02ae530ebb33ee8528ac0b9061d41216d3f3d4dcd8e9b0fe7f7cd0511247b7df

  • SHA512

    c24c5b4c3d1b9355db8e82aa3c1c228e12b107c2f2ad76ac5e1ec62dda516cbe2237b1839547ff80e9059a3f2debc1cf07daf30dc3dad2b579aa4eddb9ba33a0

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02ae530ebb33ee8528ac0b9061d41216d3f3d4dcd8e9b0fe7f7cd0511247b7df.exe
    "C:\Users\Admin\AppData\Local\Temp\02ae530ebb33ee8528ac0b9061d41216d3f3d4dcd8e9b0fe7f7cd0511247b7df.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:288
    • C:\Users\Admin\AppData\Local\Temp\EyeCry.exe
      "C:\Users\Admin\AppData\Local\Temp\EyeCry.exe"
      2⤵
      • Executes dropped EXE
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Windows\SysWOW64\shutdown.exe
        shutdown.exe -r -f -t 0
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1192
      • C:\Windows\SysWOW64\shutdown.exe
        C:\Windows\System32\shutdown.exe -r -f -t 0
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1468
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:1708
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1836

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Bootkit

      1
      T1067

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\EyeCry.exe
        MD5

        89aa34d7e47e5eaf4fca900c8b512f4f

        SHA1

        e91e288a5279a981759e1574fbba672c5cd0a6c0

        SHA256

        be382041837eb1dfd57227858359a56ecd4be9a5902b399bb684c9c7d9606f15

        SHA512

        f05058b4320799ec2ec1fc9c6224da71e390b36c2c8394b9924ff9889e8f72165823d327aaa130b0c1c9e1a43c8bcf7a086ae4059c94647b66e53d653c8c83e6

      • \Users\Admin\AppData\Local\Temp\EyeCry.exe
        MD5

        89aa34d7e47e5eaf4fca900c8b512f4f

        SHA1

        e91e288a5279a981759e1574fbba672c5cd0a6c0

        SHA256

        be382041837eb1dfd57227858359a56ecd4be9a5902b399bb684c9c7d9606f15

        SHA512

        f05058b4320799ec2ec1fc9c6224da71e390b36c2c8394b9924ff9889e8f72165823d327aaa130b0c1c9e1a43c8bcf7a086ae4059c94647b66e53d653c8c83e6

      • memory/1192-3-0x0000000000000000-mapping.dmp
      • memory/1468-4-0x0000000000000000-mapping.dmp
      • memory/1708-5-0x0000000002970000-0x0000000002971000-memory.dmp
        Filesize

        4KB

      • memory/1708-14-0x0000000002970000-0x0000000002971000-memory.dmp
        Filesize

        4KB

      • memory/1708-16-0x0000000002970000-0x0000000002971000-memory.dmp
        Filesize

        4KB

      • memory/2028-1-0x0000000000000000-mapping.dmp