Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
08/07/2023, 17:47
Static task
static1
Behavioral task
behavioral1
Sample
974b3b3eec66d4exeexeexeex.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
974b3b3eec66d4exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
974b3b3eec66d4exeexeexeex.exe
-
Size
32.8MB
-
MD5
974b3b3eec66d4a9895b4d2585fba8f9
-
SHA1
124b4997b890dd08252bad9e055d6f8c6e875ae9
-
SHA256
64a55ef5cb33a1ccca9fd7cc7382f17292bea1e2fa98b9119617e08f1f16ad7b
-
SHA512
1c2da3dff78c865c95625b1a9029e8e310cd2596bae7cf45112048c011627be961f568a0aa739514e04f46b744bbed63b6a906d8743b19f870de73300470c2a0
-
SSDEEP
393216:Lb06zi0agldgBSfTNzvoYw+aZckg/bdsGD5wkYeIXINmszSqHCHTcY2u+D0iDUVO:306e0g+Vvwckg/RzwfcPg+D0iYW6oBJ
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2244 974b3b3eec66d4exeexeexeex.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 974b3b3eec66d4exeexeexeex.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\360\360DrvMgr\7179758.tmp 974b3b3eec66d4exeexeexeex.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1A893393-71A8-4a50-95A1-2B89DE87B24C} 974b3b3eec66d4exeexeexeex.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1A893393-71A8-4a50-95A1-2B89DE87B24C}\ = "0" 974b3b3eec66d4exeexeexeex.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1A893393-71A8-4a50-95A1-2B89DE87B24C} 974b3b3eec66d4exeexeexeex.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2244 974b3b3eec66d4exeexeexeex.exe 2244 974b3b3eec66d4exeexeexeex.exe 2244 974b3b3eec66d4exeexeexeex.exe 2244 974b3b3eec66d4exeexeexeex.exe 2244 974b3b3eec66d4exeexeexeex.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\974b3b3eec66d4exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\974b3b3eec66d4exeexeexeex.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2244
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
949KB
MD5e421a1ec939ad95483bba5e326264184
SHA15d50f278be5f80ed2f84ace4750fc2a5a3ac169b
SHA2566b9288cfef00524762e23f5acb3f419ab8f5c36d62271053e447dd075e4510bc
SHA512330ce107d0d3d54342feb8dc19d10c940a7a09df34404eabb986117b983dd32ce6032ebe6a0256e254b1ddc64d9153db1cff6466072958baadf9a1bc322d2a61