Analysis

  • max time kernel
    14s
  • max time network
    19s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/06/2023, 10:49

Errors

Reason
Machine shutdown

General

  • Target

    09698399.exe

  • Size

    47KB

  • MD5

    c49db747c01e539436dfba04fe62c758

  • SHA1

    e8c2ae4608bd212fe43313d417f807fe0c283a16

  • SHA256

    a0d68e6689d0aba004746b22b1816d8dd54e5f6ed73b97947da46ad7f660464c

  • SHA512

    e7cdbf0191374b57ed46a55f72c4c5d961e39afb82bdf7470e6199afaeb1c52aa67f334490ceaabbc0bb7d8f46dda8233ae0fbda1c14d133fa13265a5563ff19

  • SSDEEP

    768:9yLqzcQ8zwtHEBbGoaPbs9IKRQ5qo2GLQdJh44ztOyjg5YCtKO:cLqzcQ5kJxWpKRfzdJrIyjg57K

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09698399.exe
    "C:\Users\Admin\AppData\Local\Temp\09698399.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of AdjustPrivilegeToken
    PID:4628
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa39e4855 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:1984

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4628-133-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB