Analysis
-
max time kernel
18s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
26-05-2022 11:45
Static task
static1
Behavioral task
behavioral1
Sample
mbr.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
mbr.exe
Resource
win10-20220414-en
Behavioral task
behavioral3
Sample
mbr.exe
Resource
win10v2004-20220414-en
General
-
Target
mbr.exe
-
Size
88KB
-
MD5
6341e20beb1eac54d1cd968827480256
-
SHA1
002bd68aa065be59a27839113a4345ecf9e06190
-
SHA256
d6aad97edc9eea7eb5b9ce013c8350c48787dbc7753318832ad0be425b2be2ee
-
SHA512
2c83f1bdb2559888bcee7683bb902c6da8d4c9f1682aa5bc8b0975ee4eb65a53dac7325a00095db297f0ca3ee236046cfaf784fff338f187690f0f04d5e0e53d
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
mbr.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" mbr.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 1 IoCs
Processes:
mbr.exepid process 1788 mbr.exe -
Loads dropped DLL 3 IoCs
Processes:
mbr.exepid process 1908 mbr.exe 1908 mbr.exe 1908 mbr.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
mbr.exedescription ioc process File opened for modification \??\PhysicalDrive0 mbr.exe -
Drops file in Program Files directory 64 IoCs
Processes:
mbr.exedescription ioc process File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE mbr.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE mbr.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe mbr.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE mbr.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE mbr.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE mbr.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe mbr.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe mbr.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE mbr.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE mbr.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE mbr.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE mbr.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE mbr.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe mbr.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe mbr.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe mbr.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE mbr.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe mbr.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe mbr.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE mbr.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE mbr.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE mbr.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE mbr.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE mbr.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE mbr.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE mbr.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe mbr.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE mbr.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe mbr.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE mbr.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE mbr.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe mbr.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE mbr.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE mbr.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE mbr.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE mbr.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE mbr.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE mbr.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe mbr.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE mbr.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE mbr.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE mbr.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE mbr.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE mbr.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE mbr.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE mbr.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE mbr.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE mbr.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe mbr.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe mbr.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE mbr.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE mbr.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe mbr.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe mbr.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe mbr.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE mbr.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe mbr.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE mbr.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE mbr.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe mbr.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe mbr.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe mbr.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE mbr.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE mbr.exe -
Drops file in Windows directory 1 IoCs
Processes:
mbr.exedescription ioc process File opened for modification C:\Windows\svchost.com mbr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
mbr.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" mbr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 1696 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1696 AUDIODG.EXE Token: 33 1696 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1696 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
mbr.exedescription pid process target process PID 1908 wrote to memory of 1788 1908 mbr.exe mbr.exe PID 1908 wrote to memory of 1788 1908 mbr.exe mbr.exe PID 1908 wrote to memory of 1788 1908 mbr.exe mbr.exe PID 1908 wrote to memory of 1788 1908 mbr.exe mbr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\mbr.exe"C:\Users\Admin\AppData\Local\Temp\mbr.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\3582-490\mbr.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\mbr.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:1788
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1544
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5041⤵
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1096
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD58562ed46d745dceb3cc268693ca25c83
SHA1309067f0c9703084654495a47e67f7a40824700d
SHA256ea5d21e6598d52b30e9d055bc406c6227bbadb5c493addb27b32fb16a6dcae8c
SHA51252f23e70f7ea6eab1a50a4008e563d787732f7361dfe10c48f39dae42bce023c90449c9a903733fab13c49b50f8c4fa7d4864ab26c69326aab0149c765fd677b
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
47KB
MD58562ed46d745dceb3cc268693ca25c83
SHA1309067f0c9703084654495a47e67f7a40824700d
SHA256ea5d21e6598d52b30e9d055bc406c6227bbadb5c493addb27b32fb16a6dcae8c
SHA51252f23e70f7ea6eab1a50a4008e563d787732f7361dfe10c48f39dae42bce023c90449c9a903733fab13c49b50f8c4fa7d4864ab26c69326aab0149c765fd677b
-
Filesize
47KB
MD58562ed46d745dceb3cc268693ca25c83
SHA1309067f0c9703084654495a47e67f7a40824700d
SHA256ea5d21e6598d52b30e9d055bc406c6227bbadb5c493addb27b32fb16a6dcae8c
SHA51252f23e70f7ea6eab1a50a4008e563d787732f7361dfe10c48f39dae42bce023c90449c9a903733fab13c49b50f8c4fa7d4864ab26c69326aab0149c765fd677b