Analysis

  • max time kernel
    20s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2022 22:55

General

  • Target

    a85dea78153d5421a2e8c382cb12e60b1a045f2e8a59e3d1ecd3c2a6d578edce.exe

  • Size

    319KB

  • MD5

    5af24c5b9fa96810ed9ce8b8e170d501

  • SHA1

    b97d57183371de3c901586f8f07a73ada687ffa9

  • SHA256

    a85dea78153d5421a2e8c382cb12e60b1a045f2e8a59e3d1ecd3c2a6d578edce

  • SHA512

    e1526d170964ef09e029b1346386b551d15a26862f059b51a8ae802e1a95251d9dd4074b41d45f557af0483a51c8183a36bd79cc0da1b2a2319f0709dc772ea4

  • SSDEEP

    6144:pYz2w+pCCTuiHOyfTGWWjRSwnVW5GJZ2tNYLj8MfscYTbUZj9ZwR+CSsyC:pYTACouoxfilVzYKj86sZ4JySsyC

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a85dea78153d5421a2e8c382cb12e60b1a045f2e8a59e3d1ecd3c2a6d578edce.exe
    "C:\Users\Admin\AppData\Local\Temp\a85dea78153d5421a2e8c382cb12e60b1a045f2e8a59e3d1ecd3c2a6d578edce.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of SetThreadContext
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Users\Admin\AppData\Local\Temp\a85dea78153d5421a2e8c382cb12e60b1a045f2e8a59e3d1ecd3c2a6d578edce.exe
      "C:\Users\Admin\AppData\Local\Temp\a85dea78153d5421a2e8c382cb12e60b1a045f2e8a59e3d1ecd3c2a6d578edce.exe"
      2⤵
        PID:272

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/272-57-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/272-58-0x0000000000407C89-mapping.dmp

    • memory/272-62-0x0000000000400000-0x0000000000408960-memory.dmp

      Filesize

      34KB

    • memory/272-63-0x0000000075811000-0x0000000075813000-memory.dmp

      Filesize

      8KB

    • memory/272-64-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/2004-54-0x0000000000400000-0x0000000000509000-memory.dmp

      Filesize

      1.0MB

    • memory/2004-60-0x0000000000400000-0x0000000000509000-memory.dmp

      Filesize

      1.0MB

    • memory/2004-61-0x00000000006C0000-0x00000000006C9000-memory.dmp

      Filesize

      36KB