Analysis
-
max time kernel
34s -
max time network
9s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2022, 23:11
Static task
static1
Behavioral task
behavioral1
Sample
3f1fca90e47b6f96893f43019663f5b06b020fd6a228998e4ab117ef33565078.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3f1fca90e47b6f96893f43019663f5b06b020fd6a228998e4ab117ef33565078.exe
Resource
win10v2004-20220812-en
General
-
Target
3f1fca90e47b6f96893f43019663f5b06b020fd6a228998e4ab117ef33565078.exe
-
Size
2.7MB
-
MD5
0c9a63fe8d09e44833a48d26eb9c634a
-
SHA1
0293e13b24fe5c9201135b2ce73235d084b3ae6e
-
SHA256
3f1fca90e47b6f96893f43019663f5b06b020fd6a228998e4ab117ef33565078
-
SHA512
33c42f09a1cfc6db164b6be18da64d6db5c736d1e4e3bb8a7f6b119d3dc553d4f58d72d6b92db6d8584ed4b55ffb73c29833fd5c8e18951289f2ba8fe34bf569
-
SSDEEP
49152:ksVGhAsgp8UcrENXrsVGhAsgp8UcrENXU:/VC1CZMewVC1CZMek
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 2508 3f1fca90e47b6f96893f43019663f5b06b020fd6a228998e4ab117ef33565078.exe 2508 3f1fca90e47b6f96893f43019663f5b06b020fd6a228998e4ab117ef33565078.exe 2508 3f1fca90e47b6f96893f43019663f5b06b020fd6a228998e4ab117ef33565078.exe 2508 3f1fca90e47b6f96893f43019663f5b06b020fd6a228998e4ab117ef33565078.exe 2508 3f1fca90e47b6f96893f43019663f5b06b020fd6a228998e4ab117ef33565078.exe 2508 3f1fca90e47b6f96893f43019663f5b06b020fd6a228998e4ab117ef33565078.exe 2508 3f1fca90e47b6f96893f43019663f5b06b020fd6a228998e4ab117ef33565078.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 3f1fca90e47b6f96893f43019663f5b06b020fd6a228998e4ab117ef33565078.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2508 3f1fca90e47b6f96893f43019663f5b06b020fd6a228998e4ab117ef33565078.exe 2508 3f1fca90e47b6f96893f43019663f5b06b020fd6a228998e4ab117ef33565078.exe 2508 3f1fca90e47b6f96893f43019663f5b06b020fd6a228998e4ab117ef33565078.exe 2508 3f1fca90e47b6f96893f43019663f5b06b020fd6a228998e4ab117ef33565078.exe 2508 3f1fca90e47b6f96893f43019663f5b06b020fd6a228998e4ab117ef33565078.exe 2508 3f1fca90e47b6f96893f43019663f5b06b020fd6a228998e4ab117ef33565078.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f1fca90e47b6f96893f43019663f5b06b020fd6a228998e4ab117ef33565078.exe"C:\Users\Admin\AppData\Local\Temp\3f1fca90e47b6f96893f43019663f5b06b020fd6a228998e4ab117ef33565078.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
PID:2508
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD51ab5ecb42ea7ef15f193597d73f68407
SHA16591c5109dff669c486dbd07cd1d6f58e19b403e
SHA2561204e441ab63f82e7b3c4eb3aa3effd77a7c5c6b542e37b39b3aaaeecbe7aeca
SHA5121a4cd24a79bbbcabdc694947da81cc1d8bccd771b55b6fdfe9859e25b82a832b1ec525490d438e876d2d9b55cdfdae5995562b8b4805f5dc37066acde97bd82a
-
Filesize
90KB
MD5d95b0330577bbdbb581eba068cf743eb
SHA12cdf62b334c62b50a4755b899ec2fa0e7ee4d7fd
SHA256456899477dffe1ddf82f0a96a5784a315f49734ae9f4b00ef4966c69f3e71973
SHA5125942c6fa939b8528dc474dfd3c69d5c4e5be3af8c8015f317dd255d69d6c710660e6172424c2879bd2e342893d3d60c63df37854afc54013655695427e27d9d7
-
Filesize
32KB
MD5bb1cd4129a323e7a721726777b8cec30
SHA1083e1e9edb5676c72dc66be0843e93a8d266b421
SHA2566ecbdcd7655571ab76bdecd95996a9a15513dbdfd5d0d6d90dfb81bf9909b326
SHA512f25dd14e4358d725724d40bdf2a27daa5d9b7436bacaff09b633c9780a58ceed5ca369a903489e4db3daf30d58b3ad74d2eba43a23093bbeed5cc791266c15bd
-
Filesize
16KB
MD56cc5f877afd3637c00ef2f68ce633607
SHA1612a3a6528ed4181fdb04ca261f9f034a96a8603
SHA256cc22dec58ee9b9fc4445c8d3d402ce4b7f47e82daa35d725315e4cb11db1ad6d
SHA5120c5501b8d96ab7fdadcefb27b252e182eaccfc7df426e928964131cfb5d15e9ceee9a9d0d4b3d3cb2769b63ce69a286e66f88ba4a2e527c4977f7392f5f6c14c
-
Filesize
61KB
MD55870ec872a8fce4e4959bd2d73f05015
SHA11fd14293def33d06c1db9a7e9dcc0ed4eb20b33c
SHA2569302800c990263735ba7f0c6719bff856e31b3c947550f746aa67c3638b02c5b
SHA5126d44c96da98fbb24f5122ffdaaea247fcfd40f5a445a05c076b4f0c955e3095c685a05c332519ce6a8e3a79986e5c55527be7a0e862a6ecbc22711143861a194
-
Filesize
29KB
MD5c2fcd0a0806818f3d8e444917b63bfb1
SHA1e9015f9f6fbef0313114f7e66087a32fae89ecd9
SHA256045b0d83e507ab83756b89d12fb5174ee13006cf35465025b5df6d8805b504a8
SHA5129951b422e307531f39e865d8b66eebd8bdf5fd87d7be3cd62539cb2f5d693f05673dd3582304976c57eb9e89f72324adcde9d8369cfe7d200453b40c548bdc18
-
Filesize
36KB
MD5c179fa29e99ecab0d5ff6638de274bf0
SHA10e42f98a05c5a4d91092ebc3475e4967787869eb
SHA256a5c873628ea34716ae5967d42556f64b1817cd84e70ae0618d6afadebf9450c7
SHA512a24a34e422da6261108e12d66d385b7eb06a6d4dc4be68cab3eab4e1bebb64af4670ac6410ed4563dc6af9b5f3d89b6d514900e73da3360f1232de3415bcef3a