Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    27-08-2023 08:08

General

  • Target

    672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe

  • Size

    676KB

  • MD5

    2ab765da96e5e7d082f3cd11be081654

  • SHA1

    897f7919c3577a95dbd3d7ba0633f87cdf0ba4f5

  • SHA256

    672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9

  • SHA512

    f892d367ed546c948001ba0a214011b13faa35b2ab11f09ae4ea02c4d0be31025201524a38ea56ab3f249a517b49edf3dffef6899bbfd33eab12aa3845dd2d03

  • SSDEEP

    6144:z5+wzHywOv9sn4OwB7p+S+Wo89UNS8VuiIWUlhxcGsZ0yO1g/rTDAsldDapA3qkq:z5+wjsyn4OwF0S3ninUXgA1OrHNl0n

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe
    "C:\Users\Admin\AppData\Local\Temp\672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2788
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c format c: /q /y
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1676
      • C:\Windows\SysWOW64\format.com
        format c: /q /y
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2268
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c format d: /q /y
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2316
      • C:\Windows\SysWOW64\format.com
        format d: /q /y
        3⤵
        • Enumerates connected drives
        PID:2280
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c format f: /q /y
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\Windows\SysWOW64\format.com
        format f: /q /y
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:1520
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c format g: /q /y
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2212
      • C:\Windows\SysWOW64\format.com
        format g: /q /y
        3⤵
        • Enumerates connected drives
        PID:2900
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c format e: /q /y
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2444
      • C:\Windows\SysWOW64\format.com
        format e: /q /y
        3⤵
        • Enumerates connected drives
        PID:2948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads