Analysis

  • max time kernel
    59s
  • max time network
    61s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2023 19:24

General

  • Target

    3eb03b5f0f2eb4937867211b291544c2c8951e9f39889b8907f73496ea6e3de0.exe

  • Size

    1.0MB

  • MD5

    7d02e616d4a9c255167c7e450cd399e0

  • SHA1

    231076805e54fdb6e77838c3ab65df9dc72a92aa

  • SHA256

    3eb03b5f0f2eb4937867211b291544c2c8951e9f39889b8907f73496ea6e3de0

  • SHA512

    48eb2b43ae9ad8b7d7d28ab813b7cdb0f1df2c97289dbe41bfc220c6373fa9e4c2707423a96c1b9909831cb8f5d3baf26a1eb2805a325435c1acc4e3d5766e1c

  • SSDEEP

    12288:BYnFwDilvy1PKQKXy9xFW8f9WGsSVSM2mxL2nRiOr8gUckc6V/g2GhBzj05cH0:qnFwelvpQlrXNL2PVh6B+BzjmcU

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3eb03b5f0f2eb4937867211b291544c2c8951e9f39889b8907f73496ea6e3de0.exe
    "C:\Users\Admin\AppData\Local\Temp\3eb03b5f0f2eb4937867211b291544c2c8951e9f39889b8907f73496ea6e3de0.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 2628
      2⤵
      • Program crash
      PID:1212

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f9ce732af1bbc873c0e04a9756e3b4be

    SHA1

    181faeaeb27d97087434e01e876930cc765f16d5

    SHA256

    1cde8f13640bf9ab98f0cfd1fda68f8c3f6050e5a5fe48df8b98ef1a70167657

    SHA512

    413ac4799abf017e8d13f75c71237346a893086fe7a139b77b90cd3ccf90caced7b1ed178ac4a833512901f3d78e059a32e14dc2d5594ae4a2668bd314b90692

  • C:\Users\Admin\AppData\Local\Temp\Cab31CD.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar3666.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • memory/1648-59-0x0000000001050000-0x0000000001090000-memory.dmp

    Filesize

    256KB

  • memory/1648-54-0x0000000001250000-0x000000000135E000-memory.dmp

    Filesize

    1.1MB

  • memory/1648-57-0x0000000001050000-0x0000000001090000-memory.dmp

    Filesize

    256KB

  • memory/1648-55-0x0000000000DA0000-0x0000000000E50000-memory.dmp

    Filesize

    704KB

  • memory/1648-126-0x0000000001050000-0x0000000001090000-memory.dmp

    Filesize

    256KB

  • memory/1648-127-0x0000000001050000-0x0000000001090000-memory.dmp

    Filesize

    256KB

  • memory/1648-128-0x000000000C560000-0x000000000CD06000-memory.dmp

    Filesize

    7.6MB

  • memory/1648-138-0x0000000001050000-0x0000000001090000-memory.dmp

    Filesize

    256KB

  • memory/1648-139-0x0000000001050000-0x0000000001090000-memory.dmp

    Filesize

    256KB

  • memory/1648-140-0x0000000001050000-0x0000000001090000-memory.dmp

    Filesize

    256KB

  • memory/1648-141-0x0000000001050000-0x0000000001090000-memory.dmp

    Filesize

    256KB