Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01-09-2023 02:41
Static task
static1
Behavioral task
behavioral1
Sample
725977e1e8b0c24496a133ed065f07e3fba51ef9ab13c44286dba9dd920b9149.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
725977e1e8b0c24496a133ed065f07e3fba51ef9ab13c44286dba9dd920b9149.exe
Resource
win10v2004-20230831-en
General
-
Target
725977e1e8b0c24496a133ed065f07e3fba51ef9ab13c44286dba9dd920b9149.exe
-
Size
1.5MB
-
MD5
45b0e1999f99256eb1932dd8a8b567b0
-
SHA1
603f05e6f3228459a55912174349ac56cdc80826
-
SHA256
725977e1e8b0c24496a133ed065f07e3fba51ef9ab13c44286dba9dd920b9149
-
SHA512
05c43a22c105b74d0cac0d0ff7de0134b75859efff97c97d62ec5cd98446f766de36fc758328a750457f2998df214311458f72c8ebce8d9f91d72b9615178373
-
SSDEEP
24576:OFehbMLd183OLsdTcQnKi9chWQFZVtqne3PzRBV29s937FHokBcM2lE4ZEbL0HzG:OmbtcU12296FIplEmSkfdkj
Malware Config
Signatures
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini 725977e1e8b0c24496a133ed065f07e3fba51ef9ab13c44286dba9dd920b9149.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 725977e1e8b0c24496a133ed065f07e3fba51ef9ab13c44286dba9dd920b9149.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION 725977e1e8b0c24496a133ed065f07e3fba51ef9ab13c44286dba9dd920b9149.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main 725977e1e8b0c24496a133ed065f07e3fba51ef9ab13c44286dba9dd920b9149.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl 725977e1e8b0c24496a133ed065f07e3fba51ef9ab13c44286dba9dd920b9149.exe Set value (int) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\725977e1e8b0c24496a133ed065f07e3fba51ef9ab13c44286dba9dd920b9149.exe = "11000" 725977e1e8b0c24496a133ed065f07e3fba51ef9ab13c44286dba9dd920b9149.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2324 725977e1e8b0c24496a133ed065f07e3fba51ef9ab13c44286dba9dd920b9149.exe 2324 725977e1e8b0c24496a133ed065f07e3fba51ef9ab13c44286dba9dd920b9149.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2324 725977e1e8b0c24496a133ed065f07e3fba51ef9ab13c44286dba9dd920b9149.exe 2324 725977e1e8b0c24496a133ed065f07e3fba51ef9ab13c44286dba9dd920b9149.exe 2324 725977e1e8b0c24496a133ed065f07e3fba51ef9ab13c44286dba9dd920b9149.exe 2324 725977e1e8b0c24496a133ed065f07e3fba51ef9ab13c44286dba9dd920b9149.exe 2324 725977e1e8b0c24496a133ed065f07e3fba51ef9ab13c44286dba9dd920b9149.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\725977e1e8b0c24496a133ed065f07e3fba51ef9ab13c44286dba9dd920b9149.exe"C:\Users\Admin\AppData\Local\Temp\725977e1e8b0c24496a133ed065f07e3fba51ef9ab13c44286dba9dd920b9149.exe"1⤵
- Drops desktop.ini file(s)
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282B
MD59e36cc3537ee9ee1e3b10fa4e761045b
SHA17726f55012e1e26cc762c9982e7c6c54ca7bb303
SHA2564b9d687ac625690fd026ed4b236dad1cac90ef69e7ad256cc42766a065b50026
SHA5125f92493c533d3add10b4ce2a364624817ebd10e32daa45ee16593e913073602db5e339430a3f7d2c44abf250e96ca4e679f1f09f8ca807d58a47cf3d5c9c3790