Analysis

  • max time kernel
    67s
  • max time network
    81s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 04:03

Errors

Reason
Machine shutdown

General

  • Target

    a45fb61cea4f75cb43ca116d5a198f4a1993a9cc98ed58824690fe9131cc45a3.exe

  • Size

    220KB

  • MD5

    e3121f47ece2ff6f56a1db4cbb192551

  • SHA1

    8dc8d58a44b958f8b750435c730b56c5e3c0073f

  • SHA256

    a45fb61cea4f75cb43ca116d5a198f4a1993a9cc98ed58824690fe9131cc45a3

  • SHA512

    ebbe604030f9ec0cfd31a61c91a7711808a30b841fd50b268b64f7d6f11cd57613833c2564cdd6c2e68dee0a179c62dc936274e8d537b094bcb30dc02c034e48

  • SSDEEP

    3072:J2FcHQxdMJ7TF4uHL+L2kwoxF/U+ywjsuGX80x5yvk0/y:JHHQbMJR4AoxF/YPuGs0x5okz

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a45fb61cea4f75cb43ca116d5a198f4a1993a9cc98ed58824690fe9131cc45a3.exe
    "C:\Users\Admin\AppData\Local\Temp\a45fb61cea4f75cb43ca116d5a198f4a1993a9cc98ed58824690fe9131cc45a3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\AppData\Local\Temp\a45fb61cea4f75cb43ca116d5a198f4a1993a9cc98ed58824690fe9131cc45a3.exe
      "C:\Users\Admin\AppData\Local\Temp\a45fb61cea4f75cb43ca116d5a198f4a1993a9cc98ed58824690fe9131cc45a3.exe"
      2⤵
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of WriteProcessMemory
      PID:1644
      • C:\Users\Admin\AppData\Local\Temp\x2z8.exe
        C:\Users\Admin\AppData\Local\Temp\\x2z8.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:940
        • C:\Users\Admin\AppData\Local\Temp\x2z8.exe
          C:\Users\Admin\AppData\Local\Temp\\x2z8.exe
          4⤵
          • Executes dropped EXE
          • Deletes itself
          • Writes to the Master Boot Record (MBR)
          • Suspicious use of AdjustPrivilegeToken
          PID:760
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:1636
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x56c
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:820
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1676

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\fpath.txt

        Filesize

        102B

        MD5

        3978d9b5be5ae14e42e6952491830103

        SHA1

        ae59ba10001e6e5f97c486299c9bb9810b30142c

        SHA256

        598f1a6cd0300cdcbd3d3d2c742003da2565bab9fe1db253a6c2f78cb949ceb1

        SHA512

        4f1f83332577945bdf6b616dff12873426b4716875f78b91a8bf475155264d6d1ef43b0d9fb86f08fd86bc48f43671e47c0559c97a5d28e2a68f5ea6299245fe

      • C:\Users\Admin\AppData\Local\Temp\x2z8.exe

        Filesize

        220KB

        MD5

        e3121f47ece2ff6f56a1db4cbb192551

        SHA1

        8dc8d58a44b958f8b750435c730b56c5e3c0073f

        SHA256

        a45fb61cea4f75cb43ca116d5a198f4a1993a9cc98ed58824690fe9131cc45a3

        SHA512

        ebbe604030f9ec0cfd31a61c91a7711808a30b841fd50b268b64f7d6f11cd57613833c2564cdd6c2e68dee0a179c62dc936274e8d537b094bcb30dc02c034e48

      • C:\Users\Admin\AppData\Local\Temp\x2z8.exe

        Filesize

        220KB

        MD5

        e3121f47ece2ff6f56a1db4cbb192551

        SHA1

        8dc8d58a44b958f8b750435c730b56c5e3c0073f

        SHA256

        a45fb61cea4f75cb43ca116d5a198f4a1993a9cc98ed58824690fe9131cc45a3

        SHA512

        ebbe604030f9ec0cfd31a61c91a7711808a30b841fd50b268b64f7d6f11cd57613833c2564cdd6c2e68dee0a179c62dc936274e8d537b094bcb30dc02c034e48

      • C:\Users\Admin\AppData\Local\Temp\x2z8.exe

        Filesize

        220KB

        MD5

        e3121f47ece2ff6f56a1db4cbb192551

        SHA1

        8dc8d58a44b958f8b750435c730b56c5e3c0073f

        SHA256

        a45fb61cea4f75cb43ca116d5a198f4a1993a9cc98ed58824690fe9131cc45a3

        SHA512

        ebbe604030f9ec0cfd31a61c91a7711808a30b841fd50b268b64f7d6f11cd57613833c2564cdd6c2e68dee0a179c62dc936274e8d537b094bcb30dc02c034e48

      • \Users\Admin\AppData\Local\Temp\x2z8.exe

        Filesize

        220KB

        MD5

        e3121f47ece2ff6f56a1db4cbb192551

        SHA1

        8dc8d58a44b958f8b750435c730b56c5e3c0073f

        SHA256

        a45fb61cea4f75cb43ca116d5a198f4a1993a9cc98ed58824690fe9131cc45a3

        SHA512

        ebbe604030f9ec0cfd31a61c91a7711808a30b841fd50b268b64f7d6f11cd57613833c2564cdd6c2e68dee0a179c62dc936274e8d537b094bcb30dc02c034e48

      • \Users\Admin\AppData\Local\Temp\x2z8.exe

        Filesize

        220KB

        MD5

        e3121f47ece2ff6f56a1db4cbb192551

        SHA1

        8dc8d58a44b958f8b750435c730b56c5e3c0073f

        SHA256

        a45fb61cea4f75cb43ca116d5a198f4a1993a9cc98ed58824690fe9131cc45a3

        SHA512

        ebbe604030f9ec0cfd31a61c91a7711808a30b841fd50b268b64f7d6f11cd57613833c2564cdd6c2e68dee0a179c62dc936274e8d537b094bcb30dc02c034e48

      • \Users\Admin\AppData\Local\Temp\x2z8.exe

        Filesize

        220KB

        MD5

        e3121f47ece2ff6f56a1db4cbb192551

        SHA1

        8dc8d58a44b958f8b750435c730b56c5e3c0073f

        SHA256

        a45fb61cea4f75cb43ca116d5a198f4a1993a9cc98ed58824690fe9131cc45a3

        SHA512

        ebbe604030f9ec0cfd31a61c91a7711808a30b841fd50b268b64f7d6f11cd57613833c2564cdd6c2e68dee0a179c62dc936274e8d537b094bcb30dc02c034e48

      • memory/760-80-0x0000000000400000-0x0000000000404000-memory.dmp

        Filesize

        16KB

      • memory/1636-81-0x000007FEFBC01000-0x000007FEFBC03000-memory.dmp

        Filesize

        8KB

      • memory/1644-54-0x0000000000400000-0x0000000000404000-memory.dmp

        Filesize

        16KB

      • memory/1644-62-0x0000000000400000-0x0000000000404000-memory.dmp

        Filesize

        16KB

      • memory/1644-55-0x0000000000400000-0x0000000000404000-memory.dmp

        Filesize

        16KB

      • memory/1644-61-0x0000000075BD1000-0x0000000075BD3000-memory.dmp

        Filesize

        8KB

      • memory/1644-66-0x0000000000400000-0x0000000000404000-memory.dmp

        Filesize

        16KB

      • memory/1644-56-0x0000000000400000-0x0000000000404000-memory.dmp

        Filesize

        16KB

      • memory/1644-58-0x0000000000400000-0x0000000000404000-memory.dmp

        Filesize

        16KB