Analysis

  • max time kernel
    42s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 05:16

General

  • Target

    0de21caa86644cf0e96032193b3920a21cdfe973e8e244e21f9f73fca330ea56.exe

  • Size

    348KB

  • MD5

    494b135ed9e12419840c26ff1d53b280

  • SHA1

    196128700c7ef3b279bf47ecd4254affa63f9165

  • SHA256

    0de21caa86644cf0e96032193b3920a21cdfe973e8e244e21f9f73fca330ea56

  • SHA512

    b2ed04ee51d7a2ee708bba340425f6e2d736ef832d481bb21afcdf1866dc7ffa76e123b9b5ea54e7967cdb5d1219d2bb549b30a972a48f67eb178dd9f221d31b

  • SSDEEP

    6144:hkPnbIgbbUhmpyVcqo5q+vl5gmBCTIJj035lG+3Gh9:h6nbQmpyCqoolmBCTHJEM8

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0de21caa86644cf0e96032193b3920a21cdfe973e8e244e21f9f73fca330ea56.exe
    "C:\Users\Admin\AppData\Local\Temp\0de21caa86644cf0e96032193b3920a21cdfe973e8e244e21f9f73fca330ea56.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1356
    • C:\Users\Admin\AppData\Local\Temp\0de21caa86644cf0e96032193b3920a21cdfe973e8e244e21f9f73fca330ea56.exe
      "C:\Users\Admin\AppData\Local\Temp\0de21caa86644cf0e96032193b3920a21cdfe973e8e244e21f9f73fca330ea56.exe"
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:816
      • C:\Users\Admin\AppData\Local\Temp\0de21caa86644cf0e96032193b3920a21cdfe973e8e244e21f9f73fca330ea56.exe
        "C:\Users\Admin\AppData\Local\Temp\0de21caa86644cf0e96032193b3920a21cdfe973e8e244e21f9f73fca330ea56.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1692

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/816-79-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/816-57-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/816-59-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/816-62-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/816-56-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1692-74-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1692-70-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1692-68-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1692-76-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1692-72-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1692-67-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1692-80-0x0000000076711000-0x0000000076713000-memory.dmp

    Filesize

    8KB

  • memory/1692-81-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1692-82-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1692-85-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB