Analysis
-
max time kernel
211s -
max time network
235s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 07:42
Static task
static1
Behavioral task
behavioral1
Sample
8913e73fa3935f88da00be03ed1d5a82e125b5553d2de8f85c8ead66d3b0632e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
8913e73fa3935f88da00be03ed1d5a82e125b5553d2de8f85c8ead66d3b0632e.exe
Resource
win10v2004-20220414-en
General
-
Target
8913e73fa3935f88da00be03ed1d5a82e125b5553d2de8f85c8ead66d3b0632e.exe
-
Size
956KB
-
MD5
4c75ac94ce30d24541a43e843ac22fc8
-
SHA1
a987dcda2e42494d4afd86fab22bff39a47be87d
-
SHA256
8913e73fa3935f88da00be03ed1d5a82e125b5553d2de8f85c8ead66d3b0632e
-
SHA512
f28e47fe7dc992a1b9e5c535b2086989f4df850986976cabe8fd1af36ff42d9d1c233f82469ce7b2b96d55d1a8d04ef015dbae7b37b3c29af01204b75e9e408e
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2236-130-0x0000000010000000-0x000000001000B000-memory.dmp upx behavioral2/memory/2236-131-0x0000000010000000-0x000000001000B000-memory.dmp upx -
Writes to the Master Boot Record (MBR) ⋅ 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
TTPs:
Processes:
8913e73fa3935f88da00be03ed1d5a82e125b5553d2de8f85c8ead66d3b0632e.exedescription ioc process File opened for modification \??\PhysicalDrive0 8913e73fa3935f88da00be03ed1d5a82e125b5553d2de8f85c8ead66d3b0632e.exe -
Program crash ⋅ 1 IoCs
Processes:
WerFault.exepid pid_target process target process 676 2236 WerFault.exe 8913e73fa3935f88da00be03ed1d5a82e125b5553d2de8f85c8ead66d3b0632e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8913e73fa3935f88da00be03ed1d5a82e125b5553d2de8f85c8ead66d3b0632e.exe"C:\Users\Admin\AppData\Local\Temp\8913e73fa3935f88da00be03ed1d5a82e125b5553d2de8f85c8ead66d3b0632e.exe"Writes to the Master Boot Record (MBR)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 236Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2236 -ip 2236
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation