Analysis

  • max time kernel
    133s
  • max time network
    82s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    24-05-2022 17:56

General

  • Target

    9bf0c7e45a534b3eea3c5242f5068b3ebbeaf0351b21a8f0e0e8d3eec75960a9.exe

  • Size

    2.2MB

  • MD5

    5ab794eb8bc239653d2bbcec8476f311

  • SHA1

    b0539ae623e9918fd3087615deaca305886cbeba

  • SHA256

    9bf0c7e45a534b3eea3c5242f5068b3ebbeaf0351b21a8f0e0e8d3eec75960a9

  • SHA512

    c238bb0697aec42199040d97d8b588e27f5dfa3c61196fb10415ea61e5be9b55ad49e960db29d697bc6166750345aa2d27e4021dd6770aae48a5f64862b6dc2d

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9bf0c7e45a534b3eea3c5242f5068b3ebbeaf0351b21a8f0e0e8d3eec75960a9.exe
    "C:\Users\Admin\AppData\Local\Temp\9bf0c7e45a534b3eea3c5242f5068b3ebbeaf0351b21a8f0e0e8d3eec75960a9.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    PID:1736

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1736-54-0x00000000755C1000-0x00000000755C3000-memory.dmp
    Filesize

    8KB