Analysis
-
max time kernel
287s -
max time network
311s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:57
Static task
static1
Behavioral task
behavioral1
Sample
c451a6d173831b920ead395689ad90dfd397abb082535c72e4176af9a7eb576e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c451a6d173831b920ead395689ad90dfd397abb082535c72e4176af9a7eb576e.exe
Resource
win10v2004-20221111-en
General
-
Target
c451a6d173831b920ead395689ad90dfd397abb082535c72e4176af9a7eb576e.exe
-
Size
226KB
-
MD5
0d9be9a0347fa5660515832b75cef4ab
-
SHA1
4c157696e26cdfb302a7b92ac6f2e3d06a425540
-
SHA256
c451a6d173831b920ead395689ad90dfd397abb082535c72e4176af9a7eb576e
-
SHA512
4eacb3f82a9ff17742af46a9ec56d4552e7649e01290812ab41d36e4131cdc2054a4abce70f37c0b2d504c0a453893e51301c0b71fda2882440db681d4d1d4dd
-
SSDEEP
6144:vUt5tIAM25GTqY91lOiPAdjDmeDmpjp6wQfLieA9OR2:MRM2kT1KmAxDG6xLfA9O
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
C4DD.tmpCB37.tmppid process 1688 C4DD.tmp 4816 CB37.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
c451a6d173831b920ead395689ad90dfd397abb082535c72e4176af9a7eb576e.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 c451a6d173831b920ead395689ad90dfd397abb082535c72e4176af9a7eb576e.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
c451a6d173831b920ead395689ad90dfd397abb082535c72e4176af9a7eb576e.exeC4DD.tmpCB37.tmppid process 4020 c451a6d173831b920ead395689ad90dfd397abb082535c72e4176af9a7eb576e.exe 1688 C4DD.tmp 4816 CB37.tmp -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
c451a6d173831b920ead395689ad90dfd397abb082535c72e4176af9a7eb576e.exedescription pid process target process PID 4020 wrote to memory of 1688 4020 c451a6d173831b920ead395689ad90dfd397abb082535c72e4176af9a7eb576e.exe C4DD.tmp PID 4020 wrote to memory of 1688 4020 c451a6d173831b920ead395689ad90dfd397abb082535c72e4176af9a7eb576e.exe C4DD.tmp PID 4020 wrote to memory of 1688 4020 c451a6d173831b920ead395689ad90dfd397abb082535c72e4176af9a7eb576e.exe C4DD.tmp PID 4020 wrote to memory of 4816 4020 c451a6d173831b920ead395689ad90dfd397abb082535c72e4176af9a7eb576e.exe CB37.tmp PID 4020 wrote to memory of 4816 4020 c451a6d173831b920ead395689ad90dfd397abb082535c72e4176af9a7eb576e.exe CB37.tmp PID 4020 wrote to memory of 4816 4020 c451a6d173831b920ead395689ad90dfd397abb082535c72e4176af9a7eb576e.exe CB37.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\c451a6d173831b920ead395689ad90dfd397abb082535c72e4176af9a7eb576e.exe"C:\Users\Admin\AppData\Local\Temp\c451a6d173831b920ead395689ad90dfd397abb082535c72e4176af9a7eb576e.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\C4DD.tmpC:\Users\Admin\AppData\Local\Temp\C4DD.tmp \888x2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\CB37.tmpC:\Users\Admin\AppData\Local\Temp\CB37.tmp \555x2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4816
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226KB
MD50d9be9a0347fa5660515832b75cef4ab
SHA14c157696e26cdfb302a7b92ac6f2e3d06a425540
SHA256c451a6d173831b920ead395689ad90dfd397abb082535c72e4176af9a7eb576e
SHA5124eacb3f82a9ff17742af46a9ec56d4552e7649e01290812ab41d36e4131cdc2054a4abce70f37c0b2d504c0a453893e51301c0b71fda2882440db681d4d1d4dd
-
Filesize
226KB
MD50d9be9a0347fa5660515832b75cef4ab
SHA14c157696e26cdfb302a7b92ac6f2e3d06a425540
SHA256c451a6d173831b920ead395689ad90dfd397abb082535c72e4176af9a7eb576e
SHA5124eacb3f82a9ff17742af46a9ec56d4552e7649e01290812ab41d36e4131cdc2054a4abce70f37c0b2d504c0a453893e51301c0b71fda2882440db681d4d1d4dd
-
Filesize
226KB
MD50d9be9a0347fa5660515832b75cef4ab
SHA14c157696e26cdfb302a7b92ac6f2e3d06a425540
SHA256c451a6d173831b920ead395689ad90dfd397abb082535c72e4176af9a7eb576e
SHA5124eacb3f82a9ff17742af46a9ec56d4552e7649e01290812ab41d36e4131cdc2054a4abce70f37c0b2d504c0a453893e51301c0b71fda2882440db681d4d1d4dd
-
Filesize
226KB
MD50d9be9a0347fa5660515832b75cef4ab
SHA14c157696e26cdfb302a7b92ac6f2e3d06a425540
SHA256c451a6d173831b920ead395689ad90dfd397abb082535c72e4176af9a7eb576e
SHA5124eacb3f82a9ff17742af46a9ec56d4552e7649e01290812ab41d36e4131cdc2054a4abce70f37c0b2d504c0a453893e51301c0b71fda2882440db681d4d1d4dd