Analysis

  • max time kernel
    39s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    25-05-2022 00:20

General

  • Target

    fdd9de3325dbad2ff4b76454c81eb9f5ab41ab63be84ad006ffc7f967d7290cf.exe

  • Size

    956KB

  • MD5

    3750b5ebd3ab298913a217f9e89eb122

  • SHA1

    171e3afbc944003bb5eb004aa92ac5cf33eadc84

  • SHA256

    fdd9de3325dbad2ff4b76454c81eb9f5ab41ab63be84ad006ffc7f967d7290cf

  • SHA512

    a66bfe5c0fcf535f600c6afcb6822e147956112df4c5a8588561810cb14fceb8ceab1c9e1052bb4fcaf5862628dbd35ac2cd83b0d9ef4da8faa7dd9cfbcf7982

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fdd9de3325dbad2ff4b76454c81eb9f5ab41ab63be84ad006ffc7f967d7290cf.exe
    "C:\Users\Admin\AppData\Local\Temp\fdd9de3325dbad2ff4b76454c81eb9f5ab41ab63be84ad006ffc7f967d7290cf.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    PID:1260

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1260-54-0x0000000075361000-0x0000000075363000-memory.dmp

    Filesize

    8KB

  • memory/1260-55-0x0000000010000000-0x000000001000B000-memory.dmp

    Filesize

    44KB

  • memory/1260-56-0x0000000010000000-0x000000001000B000-memory.dmp

    Filesize

    44KB