Analysis

  • max time kernel
    155s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    24-05-2022 18:46

General

  • Target

    c14ee4f1e06946f64232129871aaa5dcdcf7128a2eb4672c9b30b96a8726b431.exe

  • Size

    1.3MB

  • MD5

    d41f529fba6738e153cfe3e127aeb235

  • SHA1

    4e86b14c66f8ddc363ad437e1bfa3e5c2bde9a10

  • SHA256

    c14ee4f1e06946f64232129871aaa5dcdcf7128a2eb4672c9b30b96a8726b431

  • SHA512

    318ce2c3fb880348a2ddefa07d7c7b628609ef6342da66d0456bea392865c9d2318060a96218b32380708a2260882b2922875b00e4927c45735ad6feaf9d856b

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c14ee4f1e06946f64232129871aaa5dcdcf7128a2eb4672c9b30b96a8726b431.exe
    "C:\Users\Admin\AppData\Local\Temp\c14ee4f1e06946f64232129871aaa5dcdcf7128a2eb4672c9b30b96a8726b431.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1448
    • C:\Users\Admin\AppData\Local\Temp\7zSB914.tmp\downloader.exe
      .\downloader.exe %%S
      2⤵
      • Executes dropped EXE
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of WriteProcessMemory
      PID:636
      • C:\Windows\SysWOW64\cmd.exe
        /k systeminfo | findstr /c:"Model:" /c:"Host Name" /c:"OS Name"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4724
        • C:\Windows\SysWOW64\systeminfo.exe
          systeminfo
          4⤵
          • Gathers system information
          PID:2584
        • C:\Windows\SysWOW64\findstr.exe
          findstr /c:"Model:" /c:"Host Name" /c:"OS Name"
          4⤵
            PID:4868

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Bootkit

    1
    T1067

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7zSB914.tmp\downloader.exe
      Filesize

      3.1MB

      MD5

      ad9566beec8757fe727f268e7bd2d43d

      SHA1

      9fc0c813965244403b93c657f43010ffc32b16bf

      SHA256

      984024c2b82a9857f5450fc72615c7ba93b5a3f8fb7ce2de7e8c387ff78320dd

      SHA512

      45288faef559466f1def1b69a760664ab47acd45e2b347927a23842f69361a403799d344c3ca78c934792d11b580e527a6958546933713bf28bb77a5932481ef

    • C:\Users\Admin\AppData\Local\Temp\7zSB914.tmp\downloader.exe
      Filesize

      3.1MB

      MD5

      ad9566beec8757fe727f268e7bd2d43d

      SHA1

      9fc0c813965244403b93c657f43010ffc32b16bf

      SHA256

      984024c2b82a9857f5450fc72615c7ba93b5a3f8fb7ce2de7e8c387ff78320dd

      SHA512

      45288faef559466f1def1b69a760664ab47acd45e2b347927a23842f69361a403799d344c3ca78c934792d11b580e527a6958546933713bf28bb77a5932481ef

    • memory/636-130-0x0000000000000000-mapping.dmp
    • memory/2584-134-0x0000000000000000-mapping.dmp
    • memory/4724-133-0x0000000000000000-mapping.dmp
    • memory/4868-135-0x0000000000000000-mapping.dmp