Analysis

  • max time kernel
    3s
  • max time network
    5s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    08/11/2020, 04:00

Errors

Reason
Machine shutdown

General

  • Target

    02ae530ebb33ee8528ac0b9061d41216d3f3d4dcd8e9b0fe7f7cd0511247b7df.exe

  • Size

    54KB

  • MD5

    cdb6e431b4eeb2909b1cf198f70ae444

  • SHA1

    98205803babd17587e99913934eb6975c3dc8779

  • SHA256

    02ae530ebb33ee8528ac0b9061d41216d3f3d4dcd8e9b0fe7f7cd0511247b7df

  • SHA512

    c24c5b4c3d1b9355db8e82aa3c1c228e12b107c2f2ad76ac5e1ec62dda516cbe2237b1839547ff80e9059a3f2debc1cf07daf30dc3dad2b579aa4eddb9ba33a0

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02ae530ebb33ee8528ac0b9061d41216d3f3d4dcd8e9b0fe7f7cd0511247b7df.exe
    "C:\Users\Admin\AppData\Local\Temp\02ae530ebb33ee8528ac0b9061d41216d3f3d4dcd8e9b0fe7f7cd0511247b7df.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:288
    • C:\Users\Admin\AppData\Local\Temp\EyeCry.exe
      "C:\Users\Admin\AppData\Local\Temp\EyeCry.exe"
      2⤵
      • Executes dropped EXE
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Windows\SysWOW64\shutdown.exe
        shutdown.exe -r -f -t 0
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1192
      • C:\Windows\SysWOW64\shutdown.exe
        C:\Windows\System32\shutdown.exe -r -f -t 0
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1468
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:1708
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1836

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1708-5-0x0000000002970000-0x0000000002971000-memory.dmp

        Filesize

        4KB

      • memory/1708-14-0x0000000002970000-0x0000000002971000-memory.dmp

        Filesize

        4KB

      • memory/1708-16-0x0000000002970000-0x0000000002971000-memory.dmp

        Filesize

        4KB