Analysis

  • max time kernel
    152s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20230705-en
  • resource tags

    arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2023, 17:47

General

  • Target

    974b3b3eec66d4exeexeexeex.exe

  • Size

    32.8MB

  • MD5

    974b3b3eec66d4a9895b4d2585fba8f9

  • SHA1

    124b4997b890dd08252bad9e055d6f8c6e875ae9

  • SHA256

    64a55ef5cb33a1ccca9fd7cc7382f17292bea1e2fa98b9119617e08f1f16ad7b

  • SHA512

    1c2da3dff78c865c95625b1a9029e8e310cd2596bae7cf45112048c011627be961f568a0aa739514e04f46b744bbed63b6a906d8743b19f870de73300470c2a0

  • SSDEEP

    393216:Lb06zi0agldgBSfTNzvoYw+aZckg/bdsGD5wkYeIXINmszSqHCHTcY2u+D0iDUVO:306e0g+Vvwckg/RzwfcPg+D0iYW6oBJ

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 1 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\974b3b3eec66d4exeexeexeex.exe
    "C:\Users\Admin\AppData\Local\Temp\974b3b3eec66d4exeexeexeex.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    PID:2244

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\{8F7E02CD-E054-4624-A6C1-30DBD30CBDE3}.tmp

          Filesize

          949KB

          MD5

          e421a1ec939ad95483bba5e326264184

          SHA1

          5d50f278be5f80ed2f84ace4750fc2a5a3ac169b

          SHA256

          6b9288cfef00524762e23f5acb3f419ab8f5c36d62271053e447dd075e4510bc

          SHA512

          330ce107d0d3d54342feb8dc19d10c940a7a09df34404eabb986117b983dd32ce6032ebe6a0256e254b1ddc64d9153db1cff6466072958baadf9a1bc322d2a61

        • memory/2244-62-0x00000000001A0000-0x00000000001A1000-memory.dmp

          Filesize

          4KB