Analysis

  • max time kernel
    156s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-03-2023 15:44

General

  • Target

    PassMark PerformanceTest 10.2.1008 Portable/App/PerformanceTest/PerformanceTest64.exe

  • Size

    38.4MB

  • MD5

    a6cdb235f89dff35fb522cf62d4692d4

  • SHA1

    c481e6f82afc9c100f627c5ce9d5517229fbfd01

  • SHA256

    7b51752fc6c68737e80dbd467df33cbc49ecf32d9d6cb3f9ce7b97183add5098

  • SHA512

    b2b0850d18c87def067f32e9e4a42b38fc0346184133465c6c07feea708958c9e3964d1daca7365aab2dedc57f75756e4450f62985cdc9b4851c87a6bc36b2ea

  • SSDEEP

    393216:oEeoY+ZLora8K+s7jfQws80KmDJ2mXynzlJKOXpTU2KqdmdLjbbIFBryN:oKYC8Cj3onjbuB8

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: LoadsDriver 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PassMark PerformanceTest 10.2.1008 Portable\App\PerformanceTest\PerformanceTest64.exe
    "C:\Users\Admin\AppData\Local\Temp\PassMark PerformanceTest 10.2.1008 Portable\App\PerformanceTest\PerformanceTest64.exe"
    1⤵
    • Enumerates connected drives
    • Maps connected drives based on registry
    • Writes to the Master Boot Record (MBR)
    • Checks SCSI registry key(s)
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    PID:3812

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

4
T1012

Peripheral Device Discovery

3
T1120

System Information Discovery

3
T1082

Replay Monitor

Loading Replay Monitor...

Downloads