Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 23:56

General

  • Target

    709653c23fe559890886a609ce1a7b58c96acbded32504603eb47f44c7c3084e.exe

  • Size

    280KB

  • MD5

    6cd663ae039eee60a5ff6673809242c4

  • SHA1

    48e6c30840a6712e877433e71099151e64f5ec0a

  • SHA256

    709653c23fe559890886a609ce1a7b58c96acbded32504603eb47f44c7c3084e

  • SHA512

    ee03459f79eaf7f28cdbbb163d9e5ff0096afe506a186998706edc0109d97dcea308e46e9e7e715529ed9de59e23856764d1429fb9d3eb68addf327f00354485

  • SSDEEP

    6144:+JQ8lUCPiwcjqljxrIw+0PqkunR5HbasB5:xiiwioj6KxunR1a

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\709653c23fe559890886a609ce1a7b58c96acbded32504603eb47f44c7c3084e.exe
    "C:\Users\Admin\AppData\Local\Temp\709653c23fe559890886a609ce1a7b58c96acbded32504603eb47f44c7c3084e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\AppData\Local\Temp\709653c23fe559890886a609ce1a7b58c96acbded32504603eb47f44c7c3084e.exe
      "C:\Users\Admin\AppData\Local\Temp\709653c23fe559890886a609ce1a7b58c96acbded32504603eb47f44c7c3084e.exe"
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1420
      • C:\Users\Admin\AppData\Local\Temp\709653c23fe559890886a609ce1a7b58c96acbded32504603eb47f44c7c3084e.exe
        "C:\Users\Admin\AppData\Local\Temp\709653c23fe559890886a609ce1a7b58c96acbded32504603eb47f44c7c3084e.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:624

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/624-80-0x0000000075C51000-0x0000000075C53000-memory.dmp

    Filesize

    8KB

  • memory/624-86-0x0000000000290000-0x00000000002DF000-memory.dmp

    Filesize

    316KB

  • memory/624-85-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/624-82-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/624-81-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/624-67-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/624-68-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/624-72-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/624-74-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/624-70-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/624-76-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/624-77-0x0000000000410910-mapping.dmp

  • memory/1420-63-0x0000000000401768-mapping.dmp

  • memory/1420-79-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1420-56-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1420-62-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1420-57-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1420-59-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB