Analysis

  • max time kernel
    44s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    25-05-2022 00:31

General

  • Target

    68778eda7cc4b89ea1302bf9d6a91aa0c488fd7e9c959bd8a6dbef25d85baccf.exe

  • Size

    956KB

  • MD5

    e2cba8e39ab58930e9b9309e3738f0ff

  • SHA1

    30634c4f51fa739bdbd280d2ccb39ae9b096aaab

  • SHA256

    68778eda7cc4b89ea1302bf9d6a91aa0c488fd7e9c959bd8a6dbef25d85baccf

  • SHA512

    6f5a88aca725ad714e9956b7f205aecafacb3d3df0d37e8d3a58beced1e128dc3fc4938f84f3ca7197c4626cef2c506c879986784c73515c87f5edc8b5c8cfb7

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\68778eda7cc4b89ea1302bf9d6a91aa0c488fd7e9c959bd8a6dbef25d85baccf.exe
    "C:\Users\Admin\AppData\Local\Temp\68778eda7cc4b89ea1302bf9d6a91aa0c488fd7e9c959bd8a6dbef25d85baccf.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    PID:1260

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1260-54-0x00000000753C1000-0x00000000753C3000-memory.dmp

    Filesize

    8KB

  • memory/1260-55-0x0000000010000000-0x000000001000B000-memory.dmp

    Filesize

    44KB

  • memory/1260-56-0x0000000010000000-0x000000001000B000-memory.dmp

    Filesize

    44KB