Analysis

  • max time kernel
    64s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 09:21

General

  • Target

    f749ec4cf1a990cdeb6fb85a63da913fb9e28b8a808aa4fda61938859cbc6352.exe

  • Size

    120KB

  • MD5

    0cc1d047e10b38ffbe00f4f912a3b6bc

  • SHA1

    beb972f0df5fb15537d1e92a661d8fa51421a9ef

  • SHA256

    f749ec4cf1a990cdeb6fb85a63da913fb9e28b8a808aa4fda61938859cbc6352

  • SHA512

    172b3a06b8768016dd4f789cd379b7ba626f085150258416dd5c2d087ac17d13e970878c00d6fe5eb2217c4ddcf80d04a4b77e527501c93f9d3908c1f77412e4

  • SSDEEP

    3072:MuB6khjk2bKcYlsC4HmrYAXAeLxW1R1bsrBXi:M3klbbY2mdA0s1rsrBX

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f749ec4cf1a990cdeb6fb85a63da913fb9e28b8a808aa4fda61938859cbc6352.exe
    "C:\Users\Admin\AppData\Local\Temp\f749ec4cf1a990cdeb6fb85a63da913fb9e28b8a808aa4fda61938859cbc6352.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    PID:1336

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1336-54-0x00000000762D1000-0x00000000762D3000-memory.dmp

          Filesize

          8KB

        • memory/1336-55-0x0000000000400000-0x0000000000422000-memory.dmp

          Filesize

          136KB

        • memory/1336-56-0x0000000000430000-0x0000000000530000-memory.dmp

          Filesize

          1024KB