Analysis

  • max time kernel
    206s
  • max time network
    190s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 09:41

General

  • Target

    dd50ecfd845e8204cb8857f6d79d77cc5ddaf80848fd37ad747f603a525e3f1b.exe

  • Size

    272KB

  • MD5

    fd39caeeaeedfc6fbeb24a1486f5d58b

  • SHA1

    8e741953da8e772a197b74d4e6408683ef5448cb

  • SHA256

    dd50ecfd845e8204cb8857f6d79d77cc5ddaf80848fd37ad747f603a525e3f1b

  • SHA512

    c7955b87034989a6026b800123203c031a59e7abfd4d67f4c61ecbb01fe49401e2e600d5c3996cf4cd8ae29db2052c7d5c1b23c381667f8c16cb29cc627039d1

  • SSDEEP

    3072:14lQFnWjl4tYHv3iJHwxmOFuBsXpuN78UIaGWNBRyf9D2gss7jTHPkNZW9:9FnWR4tYPyN3WXpu1JIdWzRyfZ2/s9

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd50ecfd845e8204cb8857f6d79d77cc5ddaf80848fd37ad747f603a525e3f1b.exe
    "C:\Users\Admin\AppData\Local\Temp\dd50ecfd845e8204cb8857f6d79d77cc5ddaf80848fd37ad747f603a525e3f1b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Users\Admin\AppData\Local\Temp\dd50ecfd845e8204cb8857f6d79d77cc5ddaf80848fd37ad747f603a525e3f1b.exe
      "C:\Users\Admin\AppData\Local\Temp\dd50ecfd845e8204cb8857f6d79d77cc5ddaf80848fd37ad747f603a525e3f1b.exe"
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2608
      • C:\Users\Admin\AppData\Local\Temp\dd50ecfd845e8204cb8857f6d79d77cc5ddaf80848fd37ad747f603a525e3f1b.exe
        "C:\Users\Admin\AppData\Local\Temp\dd50ecfd845e8204cb8857f6d79d77cc5ddaf80848fd37ad747f603a525e3f1b.exe"
        3⤵
        • Modifies firewall policy service
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:732
        • C:\Users\Admin\AppData\Roaming\Firewall Manager\cfmmon.exe
          "C:\Users\Admin\AppData\Roaming\Firewall Manager\cfmmon.exe" in
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1352
          • C:\Users\Admin\AppData\Roaming\Firewall Manager\cfmmon.exe
            "C:\Users\Admin\AppData\Roaming\Firewall Manager\cfmmon.exe" in
            5⤵
            • Executes dropped EXE
            • Writes to the Master Boot Record (MBR)
            • Suspicious use of SetThreadContext
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:680
            • C:\Users\Admin\AppData\Roaming\Firewall Manager\cfmmon.exe
              "C:\Users\Admin\AppData\Roaming\Firewall Manager\cfmmon.exe" in
              6⤵
              • Executes dropped EXE
              PID:1256

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Firewall Manager\cfmmon.exe

    Filesize

    272KB

    MD5

    bda6b369db06b283652fc33556e1d8c7

    SHA1

    c4465a70b23b32883b5bad41a908da0cb6d7262e

    SHA256

    8007e91f9526d5066c8c9481255ef13ec895ba339b4a49eb88af0321a94c29f5

    SHA512

    e97d71c2a46ebe5eeda943d5249ea722e4cb90a63e6b60925ab2862c58a40730108db0156b6e711f3954fe9dc29d10461847ff8b11ce944bf302c1e312419289

  • C:\Users\Admin\AppData\Roaming\Firewall Manager\cfmmon.exe

    Filesize

    272KB

    MD5

    bda6b369db06b283652fc33556e1d8c7

    SHA1

    c4465a70b23b32883b5bad41a908da0cb6d7262e

    SHA256

    8007e91f9526d5066c8c9481255ef13ec895ba339b4a49eb88af0321a94c29f5

    SHA512

    e97d71c2a46ebe5eeda943d5249ea722e4cb90a63e6b60925ab2862c58a40730108db0156b6e711f3954fe9dc29d10461847ff8b11ce944bf302c1e312419289

  • C:\Users\Admin\AppData\Roaming\Firewall Manager\cfmmon.exe

    Filesize

    272KB

    MD5

    bda6b369db06b283652fc33556e1d8c7

    SHA1

    c4465a70b23b32883b5bad41a908da0cb6d7262e

    SHA256

    8007e91f9526d5066c8c9481255ef13ec895ba339b4a49eb88af0321a94c29f5

    SHA512

    e97d71c2a46ebe5eeda943d5249ea722e4cb90a63e6b60925ab2862c58a40730108db0156b6e711f3954fe9dc29d10461847ff8b11ce944bf302c1e312419289

  • C:\Users\Admin\AppData\Roaming\Firewall Manager\cfmmon.exe

    Filesize

    272KB

    MD5

    bda6b369db06b283652fc33556e1d8c7

    SHA1

    c4465a70b23b32883b5bad41a908da0cb6d7262e

    SHA256

    8007e91f9526d5066c8c9481255ef13ec895ba339b4a49eb88af0321a94c29f5

    SHA512

    e97d71c2a46ebe5eeda943d5249ea722e4cb90a63e6b60925ab2862c58a40730108db0156b6e711f3954fe9dc29d10461847ff8b11ce944bf302c1e312419289

  • memory/680-166-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/732-144-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/732-146-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/732-147-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/732-152-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1256-168-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1256-167-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2608-141-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2608-137-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2608-142-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2608-148-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB