Analysis
-
max time kernel
155s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 18:46
Static task
static1
Behavioral task
behavioral1
Sample
c14ee4f1e06946f64232129871aaa5dcdcf7128a2eb4672c9b30b96a8726b431.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
c14ee4f1e06946f64232129871aaa5dcdcf7128a2eb4672c9b30b96a8726b431.exe
Resource
win10v2004-20220414-en
General
-
Target
c14ee4f1e06946f64232129871aaa5dcdcf7128a2eb4672c9b30b96a8726b431.exe
-
Size
1.3MB
-
MD5
d41f529fba6738e153cfe3e127aeb235
-
SHA1
4e86b14c66f8ddc363ad437e1bfa3e5c2bde9a10
-
SHA256
c14ee4f1e06946f64232129871aaa5dcdcf7128a2eb4672c9b30b96a8726b431
-
SHA512
318ce2c3fb880348a2ddefa07d7c7b628609ef6342da66d0456bea392865c9d2318060a96218b32380708a2260882b2922875b00e4927c45735ad6feaf9d856b
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
downloader.exepid process 636 downloader.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
downloader.exedescription ioc process File opened for modification \??\PhysicalDrive0 downloader.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
c14ee4f1e06946f64232129871aaa5dcdcf7128a2eb4672c9b30b96a8726b431.exedownloader.execmd.exedescription pid process target process PID 1448 wrote to memory of 636 1448 c14ee4f1e06946f64232129871aaa5dcdcf7128a2eb4672c9b30b96a8726b431.exe downloader.exe PID 1448 wrote to memory of 636 1448 c14ee4f1e06946f64232129871aaa5dcdcf7128a2eb4672c9b30b96a8726b431.exe downloader.exe PID 1448 wrote to memory of 636 1448 c14ee4f1e06946f64232129871aaa5dcdcf7128a2eb4672c9b30b96a8726b431.exe downloader.exe PID 636 wrote to memory of 4724 636 downloader.exe cmd.exe PID 636 wrote to memory of 4724 636 downloader.exe cmd.exe PID 636 wrote to memory of 4724 636 downloader.exe cmd.exe PID 4724 wrote to memory of 2584 4724 cmd.exe systeminfo.exe PID 4724 wrote to memory of 2584 4724 cmd.exe systeminfo.exe PID 4724 wrote to memory of 2584 4724 cmd.exe systeminfo.exe PID 4724 wrote to memory of 4868 4724 cmd.exe findstr.exe PID 4724 wrote to memory of 4868 4724 cmd.exe findstr.exe PID 4724 wrote to memory of 4868 4724 cmd.exe findstr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c14ee4f1e06946f64232129871aaa5dcdcf7128a2eb4672c9b30b96a8726b431.exe"C:\Users\Admin\AppData\Local\Temp\c14ee4f1e06946f64232129871aaa5dcdcf7128a2eb4672c9b30b96a8726b431.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zSB914.tmp\downloader.exe.\downloader.exe %%S2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/k systeminfo | findstr /c:"Model:" /c:"Host Name" /c:"OS Name"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\systeminfo.exesysteminfo4⤵
- Gathers system information
-
C:\Windows\SysWOW64\findstr.exefindstr /c:"Model:" /c:"Host Name" /c:"OS Name"4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7zSB914.tmp\downloader.exeFilesize
3.1MB
MD5ad9566beec8757fe727f268e7bd2d43d
SHA19fc0c813965244403b93c657f43010ffc32b16bf
SHA256984024c2b82a9857f5450fc72615c7ba93b5a3f8fb7ce2de7e8c387ff78320dd
SHA51245288faef559466f1def1b69a760664ab47acd45e2b347927a23842f69361a403799d344c3ca78c934792d11b580e527a6958546933713bf28bb77a5932481ef
-
C:\Users\Admin\AppData\Local\Temp\7zSB914.tmp\downloader.exeFilesize
3.1MB
MD5ad9566beec8757fe727f268e7bd2d43d
SHA19fc0c813965244403b93c657f43010ffc32b16bf
SHA256984024c2b82a9857f5450fc72615c7ba93b5a3f8fb7ce2de7e8c387ff78320dd
SHA51245288faef559466f1def1b69a760664ab47acd45e2b347927a23842f69361a403799d344c3ca78c934792d11b580e527a6958546933713bf28bb77a5932481ef
-
memory/636-130-0x0000000000000000-mapping.dmp
-
memory/2584-134-0x0000000000000000-mapping.dmp
-
memory/4724-133-0x0000000000000000-mapping.dmp
-
memory/4868-135-0x0000000000000000-mapping.dmp