Analysis

  • max time kernel
    7s
  • max time network
    9s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-06-2023 10:45

General

  • Target

    09014499.exe

  • Size

    266KB

  • MD5

    59b67eedefb38bf48b9ad658e927d458

  • SHA1

    e6811915564cc81e8e2ab0c28b5d37f5d338ac5d

  • SHA256

    0e69afe93c6ca4efef5b28ab326795b1334a8268b39685c9a07e4d05202adb8c

  • SHA512

    6e1e3ca11fec2adcc0f75a1c3248661c74f6d215c74d75f7c666de2a0db7878f87430058a21af8c1d7f55702a6c1a430c37d6512bcf00e326ac4e82dba846dc9

  • SSDEEP

    6144:lJPaqJtBOJgX7BbTHYJU4FLSPMnmjhhunqd+T9pQ:lBaSX7FTHYJfLhTvQ

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09014499.exe
    "C:\Users\Admin\AppData\Local\Temp\09014499.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4320
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 488
      2⤵
      • Program crash
      PID:4256
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4320 -ip 4320
    1⤵
      PID:4572

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads