Analysis
-
max time kernel
142s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
22-05-2022 05:34
Static task
static1
Behavioral task
behavioral1
Sample
lianzhanst.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
lianzhanst.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
lianzhanst.exe
-
Size
3.6MB
-
MD5
96e4d115b0edc2d77fb7b447e11fda39
-
SHA1
b3ddf70a0c29b9ab5163702ae420717f39a3e2a4
-
SHA256
e5975f25c103fae9d95d4652ec3b9e4c479d445d61c88f08354835b85e4b7546
-
SHA512
beb44f9d0fdcf281513dc8776a6253d97096ea61c847158cc99eade7b083fcd47c5e91f6d20fb75d2d1cd6e0df10ccd50c281f2d343824f726571a6f2dda3723
Score
6/10
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
lianzhanst.exedescription ioc process File opened for modification \??\PhysicalDrive0 lianzhanst.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
lianzhanst.exepid process 1640 lianzhanst.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
lianzhanst.exepid process 1640 lianzhanst.exe 1640 lianzhanst.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1640-54-0x0000000076241000-0x0000000076243000-memory.dmpFilesize
8KB
-
memory/1640-55-0x0000000000400000-0x000000000097E000-memory.dmpFilesize
5.5MB
-
memory/1640-56-0x0000000000400000-0x000000000097E000-memory.dmpFilesize
5.5MB
-
memory/1640-57-0x0000000000400000-0x000000000097E000-memory.dmpFilesize
5.5MB
-
memory/1640-58-0x0000000000400000-0x000000000097E000-memory.dmpFilesize
5.5MB