Analysis
-
max time kernel
175s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2022, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe
Resource
win10v2004-20221111-en
General
-
Target
5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe
-
Size
170KB
-
MD5
fc3bdfec5907968cc35af7ed8eb49784
-
SHA1
2e34767187c03733e07f7882a3490d9bfa1aebd3
-
SHA256
5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a
-
SHA512
b7ab999b2d04366de12799a843d06d4971ace3826c6d5194db547cc15437c90ce01ca65a7b9997d7bcf96ec6264f35ef305604a87d3921aba933b9706f51c3af
-
SSDEEP
3072:ReWfjw5CsqDbgXu6dbrePqNdLn+BvU5clFIW2ZZdYbi9mbF:h85Csq6breAEU5ciW2ZZNy
Malware Config
Signatures
-
Unexpected DNS network traffic destination 64 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 195.117.136.1 Destination IP 213.128.194.2 Destination IP 195.197.161.251 Destination IP 211.115.194.2 Destination IP 153.19.102.182 Destination IP 195.110.96.67 Destination IP 195.57.87.141 Destination IP 195.23.146.192 Destination IP 195.61.132.98 Destination IP 195.25.33.192 Destination IP 195.97.188.244 Destination IP 195.37.118.146 Destination IP 195.97.43.91 Destination IP 195.162.214.226 Destination IP 195.212.77.97 Destination IP 165.76.4.2 Destination IP 195.22.122.138 Destination IP 195.175.228.212 Destination IP 195.241.72.222 Destination IP 195.198.88.93 Destination IP 195.136.46.107 Destination IP 195.117.67.124 Destination IP 64.14.124.73 Destination IP 150.199.199.1 Destination IP 195.72.226.156 Destination IP 64.14.124.73 Destination IP 195.13.198.17 Destination IP 195.123.73.55 Destination IP 195.196.25.92 Destination IP 66.208.1.2 Destination IP 195.122.164.184 Destination IP 195.61.132.98 Destination IP 195.197.161.251 Destination IP 195.16.90.90 Destination IP 195.89.25.221 Destination IP 195.97.188.244 Destination IP 195.29.100.61 Destination IP 195.241.72.222 Destination IP 61.122.116.165 Destination IP 195.117.67.124 Destination IP 195.15.51.221 Destination IP 59.188.4.78 Destination IP 131.94.7.220 Destination IP 195.97.43.91 Destination IP 195.25.33.192 Destination IP 195.136.46.107 Destination IP 195.72.226.156 Destination IP 195.117.67.124 Destination IP 195.212.77.97 Destination IP 195.110.96.67 Destination IP 131.94.7.220 Destination IP 195.84.233.218 Destination IP 195.18.57.30 Destination IP 61.122.116.165 Destination IP 64.14.124.73 Destination IP 203.240.193.11 Destination IP 195.159.130.77 Destination IP 195.110.96.67 Destination IP 195.160.40.53 Destination IP 59.188.4.78 Destination IP 211.115.194.2 Destination IP 195.22.122.138 Destination IP 195.162.214.226 Destination IP 213.128.194.2 -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe -
Suspicious use of SetWindowsHookEx 36 IoCs
pid Process 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe 1868 5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe"C:\Users\Admin\AppData\Local\Temp\5aa2a4b41857e176fdf1721e7a45b28e7bed8754f9b3f10e7ac5ff8d234cf26a.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1868