Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08-06-2023 19:34
Behavioral task
behavioral1
Sample
0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exe
Resource
win10v2004-20230220-en
General
-
Target
0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exe
-
Size
1015KB
-
MD5
8bb055bce83cc5e64e9505b2e863aa16
-
SHA1
46ec2fb8d74d1075b6f31c4e4dda18b308cecd34
-
SHA256
0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3
-
SHA512
62ccdb669d6db6bb09581b5afc325f22dd487d221e9f78d48b0d8f2c1526b5fac3282e812ae54d6abb050ce96a35103e277e77e6422c888d3bfbee5cb70fe804
-
SSDEEP
24576:RUDM+QgoVymNzBku/wK4LeEun/gt1NhJZ1miRd7Ch86Y4w/ZW:RNhVTz6A3Eu/gDDJZ8iHK7Yl4
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exedescription ioc process File opened for modification \??\PhysicalDrive0 0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exe -
Modifies Control Panel 8 IoCs
Processes:
0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\sTime = ":" 0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\sShortDate = "yyyy-MM-dd" 0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\iDate = "2" 0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\sDate = "-" 0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\sTimeFormat = "HH:mm:ss" 0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\iTime = "1" 0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\iTLZero = "1" 0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\iTimePrefix = "0" 0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exepid process 4032 0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exe 4032 0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exe 4032 0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exe 4032 0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exepid process 4032 0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exe 4032 0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exe 4032 0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exe 4032 0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exepid process 4032 0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exe 4032 0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exe"C:\Users\Admin\AppData\Local\Temp\0d034a76683609d7e733cdccb72aecd63a219364d8c394b9828a72263f0078e3.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Modifies Control Panel
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4032-133-0x0000000000400000-0x0000000000824000-memory.dmpFilesize
4.1MB
-
memory/4032-134-0x00000000025A0000-0x00000000025A1000-memory.dmpFilesize
4KB
-
memory/4032-135-0x0000000000400000-0x0000000000824000-memory.dmpFilesize
4.1MB
-
memory/4032-139-0x0000000000400000-0x0000000000824000-memory.dmpFilesize
4.1MB
-
memory/4032-141-0x0000000000400000-0x0000000000824000-memory.dmpFilesize
4.1MB
-
memory/4032-144-0x0000000000400000-0x0000000000824000-memory.dmpFilesize
4.1MB
-
memory/4032-148-0x0000000000400000-0x0000000000824000-memory.dmpFilesize
4.1MB