General
Target
Filesize
Completed
Task
c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe
815KB
20-05-2022 23:06
behavioral1
Score
6/10
MD5
SHA1
SHA256
SHA256
21ce894ccbef788a1b2af896e2aaf2a0
7ca645c7855bff3e2f1575d50f89a516b870d6de
c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247
6fa7a28936d70d2b94a89443988d8a81fe3c3cf6a91500ebf02c6c3962126e0c2e1a219c485c5dc90bc7d815f15533414d184056e675e348061e11cb82e22993
Malware Config
Signatures 5
Filter: none
Defense Evasion
Persistence
-
Writes to the Master Boot Record (MBR)c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe
Description
Bootkits write to the MBR to gain persistence at a level below the operating system.
Tags
TTPs
Reported IOCs
description ioc process File opened for modification \??\PhysicalDrive0 c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe -
Modifies Internet Explorer settingsc8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe
Tags
TTPs
Reported IOCs
description ioc process Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe = "11000" c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage\7654.com\NumberOfSubdomains = "1" c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage\news.7654.com c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage\7654.com\Total = "63" c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage\7654.com c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\DOMStorage\news.7654.com\ = "63" c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\Main c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe -
Suspicious behavior: EnumeratesProcessesc8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe
Reported IOCs
pid process 1788 c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe 1788 c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe -
Suspicious use of FindShellTrayWindowc8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe
Reported IOCs
pid process 1788 c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe -
Suspicious use of SetWindowsHookExc8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe
Reported IOCs
pid process 1788 c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe 1788 c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe 1788 c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe 1788 c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe 1788 c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe 1788 c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe 1788 c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe
Processes 1
-
C:\Users\Admin\AppData\Local\Temp\c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe"C:\Users\Admin\AppData\Local\Temp\c8aeab9d69faff3486bbd01383f76f837ef7ac7f25d1b0088add95c8ec35a247.exe"Writes to the Master Boot Record (MBR)Modifies Internet Explorer settingsSuspicious behavior: EnumeratesProcessesSuspicious use of FindShellTrayWindowSuspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Replay Monitor
00:00
00:00
Downloads
-
memory/1788-54-0x0000000075DB1000-0x0000000075DB3000-memory.dmp
Title
Loading data