Analysis
-
max time kernel
24s -
max time network
26s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
26-05-2022 11:45
Static task
static1
Behavioral task
behavioral1
Sample
mbr.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
mbr.exe
Resource
win10-20220414-en
Behavioral task
behavioral3
Sample
mbr.exe
Resource
win10v2004-20220414-en
General
-
Target
mbr.exe
-
Size
88KB
-
MD5
6341e20beb1eac54d1cd968827480256
-
SHA1
002bd68aa065be59a27839113a4345ecf9e06190
-
SHA256
d6aad97edc9eea7eb5b9ce013c8350c48787dbc7753318832ad0be425b2be2ee
-
SHA512
2c83f1bdb2559888bcee7683bb902c6da8d4c9f1682aa5bc8b0975ee4eb65a53dac7325a00095db297f0ca3ee236046cfaf784fff338f187690f0f04d5e0e53d
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
mbr.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" mbr.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 1 IoCs
Processes:
mbr.exepid process 3184 mbr.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
mbr.exedescription ioc process File opened for modification \??\PhysicalDrive0 mbr.exe -
Drops file in Program Files directory 55 IoCs
Processes:
mbr.exedescription ioc process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE mbr.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE mbr.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE mbr.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE mbr.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe mbr.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE mbr.exe File opened for modification C:\PROGRA~2\WINDOW~2\WinMail.exe mbr.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe mbr.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe mbr.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE mbr.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE mbr.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE mbr.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe mbr.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe mbr.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe mbr.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe mbr.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE mbr.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe mbr.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe mbr.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE mbr.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE mbr.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE mbr.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE mbr.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE mbr.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE mbr.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe mbr.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE mbr.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe mbr.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE mbr.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE mbr.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe mbr.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE mbr.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe mbr.exe File opened for modification C:\PROGRA~2\WINDOW~4\ACCESS~1\wordpad.exe mbr.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe mbr.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe mbr.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe mbr.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe mbr.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe mbr.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE mbr.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe mbr.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE mbr.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE mbr.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE mbr.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe mbr.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE mbr.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe mbr.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe mbr.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE mbr.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe mbr.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE mbr.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE mbr.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE mbr.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe mbr.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE mbr.exe -
Drops file in Windows directory 1 IoCs
Processes:
mbr.exedescription ioc process File opened for modification C:\Windows\svchost.com mbr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 15 IoCs
Processes:
LogonUI.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "1" LogonUI.exe -
Modifies registry class 1 IoCs
Processes:
mbr.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" mbr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 1960 LogonUI.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
mbr.exedescription pid process target process PID 1496 wrote to memory of 3184 1496 mbr.exe mbr.exe PID 1496 wrote to memory of 3184 1496 mbr.exe mbr.exe PID 1496 wrote to memory of 3184 1496 mbr.exe mbr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\mbr.exe"C:\Users\Admin\AppData\Local\Temp\mbr.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\3582-490\mbr.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\mbr.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:3184
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3ad5055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1960
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD58562ed46d745dceb3cc268693ca25c83
SHA1309067f0c9703084654495a47e67f7a40824700d
SHA256ea5d21e6598d52b30e9d055bc406c6227bbadb5c493addb27b32fb16a6dcae8c
SHA51252f23e70f7ea6eab1a50a4008e563d787732f7361dfe10c48f39dae42bce023c90449c9a903733fab13c49b50f8c4fa7d4864ab26c69326aab0149c765fd677b
-
Filesize
47KB
MD58562ed46d745dceb3cc268693ca25c83
SHA1309067f0c9703084654495a47e67f7a40824700d
SHA256ea5d21e6598d52b30e9d055bc406c6227bbadb5c493addb27b32fb16a6dcae8c
SHA51252f23e70f7ea6eab1a50a4008e563d787732f7361dfe10c48f39dae42bce023c90449c9a903733fab13c49b50f8c4fa7d4864ab26c69326aab0149c765fd677b