Analysis

  • max time kernel
    91s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 21:08

General

  • Target

    e5b84ca41fb3fad769a813ce66abe424c6995ede2450b57407d717e5f47830b0.exe

  • Size

    3.6MB

  • MD5

    fad1658fcca8cc6f8bf175f7a97df972

  • SHA1

    1763b7b88ec330f101977192930058480cc6b6ae

  • SHA256

    e5b84ca41fb3fad769a813ce66abe424c6995ede2450b57407d717e5f47830b0

  • SHA512

    bbccf9bacdd1d25e2817551310b425e16f5185e7702331c6cc8a6dcf967426d0c4eee9c0f0dd4fedb126221885578eb4be2b5d6d57d8e65a1acf89221424f36d

  • SSDEEP

    98304:X+pDaYlIjefFggxzvwn5hmdeEi3MEatfPCjs+sC37/QMU:upDPXggx85LEi3MEEqjs+8

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5b84ca41fb3fad769a813ce66abe424c6995ede2450b57407d717e5f47830b0.exe
    "C:\Users\Admin\AppData\Local\Temp\e5b84ca41fb3fad769a813ce66abe424c6995ede2450b57407d717e5f47830b0.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetWindowsHookEx
    PID:4988

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4988-132-0x0000000000400000-0x0000000000910000-memory.dmp
    Filesize

    5.1MB

  • memory/4988-133-0x0000000077020000-0x00000000771C3000-memory.dmp
    Filesize

    1.6MB

  • memory/4988-134-0x0000000075200000-0x0000000075415000-memory.dmp
    Filesize

    2.1MB

  • memory/4988-136-0x0000000076B00000-0x0000000076CA0000-memory.dmp
    Filesize

    1.6MB

  • memory/4988-137-0x0000000074F60000-0x0000000074FDA000-memory.dmp
    Filesize

    488KB

  • memory/4988-1479-0x0000000000400000-0x0000000000910000-memory.dmp
    Filesize

    5.1MB

  • memory/4988-1480-0x0000000000400000-0x0000000000910000-memory.dmp
    Filesize

    5.1MB

  • memory/4988-1481-0x0000000000400000-0x0000000000910000-memory.dmp
    Filesize

    5.1MB

  • memory/4988-1482-0x0000000000400000-0x0000000000910000-memory.dmp
    Filesize

    5.1MB

  • memory/4988-1484-0x0000000000400000-0x0000000000910000-memory.dmp
    Filesize

    5.1MB

  • memory/4988-1485-0x0000000000400000-0x0000000000910000-memory.dmp
    Filesize

    5.1MB

  • memory/4988-1486-0x0000000000400000-0x0000000000910000-memory.dmp
    Filesize

    5.1MB