Analysis
-
max time kernel
103s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 14:10
Static task
static1
Behavioral task
behavioral1
Sample
57c3b73f3d84f2643ec8e9265367c3c2f2c6849bce104c4027e787c2a87c0294.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
57c3b73f3d84f2643ec8e9265367c3c2f2c6849bce104c4027e787c2a87c0294.exe
Resource
win10v2004-20220812-en
General
-
Target
57c3b73f3d84f2643ec8e9265367c3c2f2c6849bce104c4027e787c2a87c0294.exe
-
Size
1.8MB
-
MD5
817d2bfcec7d5b6da82b987b5a6d534f
-
SHA1
e734937d6415f2e6689fa51c88a1f331c7dd2273
-
SHA256
57c3b73f3d84f2643ec8e9265367c3c2f2c6849bce104c4027e787c2a87c0294
-
SHA512
f985ca62b42968f4fc3acad25b704164630cc375d6793bf2b3a59dac8549edc577e75740e00247ff5e73aa1f0e751a62eacfe4f6554407cfe9c1b99129f0cdb0
-
SSDEEP
24576:A3SyKeS+Ck8urp9gBk0bbf2FfWl8KuqGavkg3NyNIbbbIoIBAUZLYi:A3lvS349a/+s8KuqGaX0ToIBAUZLYi
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1084-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1084-58-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1084-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1084-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1084-60-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1084-62-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1084-64-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1084-66-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1084-68-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1084-70-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1084-72-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1084-74-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1084-76-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1084-78-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1084-80-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1084-82-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1084-86-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1084-90-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1084-96-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1084-94-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1084-98-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1084-100-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1084-92-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1084-88-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1084-84-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1084-101-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 57c3b73f3d84f2643ec8e9265367c3c2f2c6849bce104c4027e787c2a87c0294.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1084 57c3b73f3d84f2643ec8e9265367c3c2f2c6849bce104c4027e787c2a87c0294.exe 1084 57c3b73f3d84f2643ec8e9265367c3c2f2c6849bce104c4027e787c2a87c0294.exe 1084 57c3b73f3d84f2643ec8e9265367c3c2f2c6849bce104c4027e787c2a87c0294.exe 1084 57c3b73f3d84f2643ec8e9265367c3c2f2c6849bce104c4027e787c2a87c0294.exe 1084 57c3b73f3d84f2643ec8e9265367c3c2f2c6849bce104c4027e787c2a87c0294.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\57c3b73f3d84f2643ec8e9265367c3c2f2c6849bce104c4027e787c2a87c0294.exe"C:\Users\Admin\AppData\Local\Temp\57c3b73f3d84f2643ec8e9265367c3c2f2c6849bce104c4027e787c2a87c0294.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
PID:1084