Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01/09/2023, 06:46
Static task
static1
Behavioral task
behavioral1
Sample
76b0cc393ed6e80c4b5158b28ad0d027864e576a6c3c4ed893645864830c5f78.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
76b0cc393ed6e80c4b5158b28ad0d027864e576a6c3c4ed893645864830c5f78.exe
Resource
win10v2004-20230831-en
General
-
Target
76b0cc393ed6e80c4b5158b28ad0d027864e576a6c3c4ed893645864830c5f78.exe
-
Size
1.5MB
-
MD5
470cde2e63400089da209339568caf9d
-
SHA1
54156457a012ffd0cba58fb4b1b71e7258dc2f66
-
SHA256
76b0cc393ed6e80c4b5158b28ad0d027864e576a6c3c4ed893645864830c5f78
-
SHA512
f96f8c33a3520b0e324a30dd425ad120b5279124f317cbc7c60c9ef46f02a28eecd75c7681f83fe001b1a5af26f18870b25127ab6dc0ddae40cfc8f40e3c8ada
-
SSDEEP
24576:OFehbMLd183OLsdTcQnKi9chWQFZVtqne3PzRBV29s937FHBkBcM2lE4ZEbL0HzS:OmbtcU12296FhplEmSkfdkP
Malware Config
Signatures
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini 76b0cc393ed6e80c4b5158b28ad0d027864e576a6c3c4ed893645864830c5f78.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 76b0cc393ed6e80c4b5158b28ad0d027864e576a6c3c4ed893645864830c5f78.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION 76b0cc393ed6e80c4b5158b28ad0d027864e576a6c3c4ed893645864830c5f78.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main 76b0cc393ed6e80c4b5158b28ad0d027864e576a6c3c4ed893645864830c5f78.exe Key created \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl 76b0cc393ed6e80c4b5158b28ad0d027864e576a6c3c4ed893645864830c5f78.exe Set value (int) \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\76b0cc393ed6e80c4b5158b28ad0d027864e576a6c3c4ed893645864830c5f78.exe = "11000" 76b0cc393ed6e80c4b5158b28ad0d027864e576a6c3c4ed893645864830c5f78.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3012 76b0cc393ed6e80c4b5158b28ad0d027864e576a6c3c4ed893645864830c5f78.exe 3012 76b0cc393ed6e80c4b5158b28ad0d027864e576a6c3c4ed893645864830c5f78.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3012 76b0cc393ed6e80c4b5158b28ad0d027864e576a6c3c4ed893645864830c5f78.exe 3012 76b0cc393ed6e80c4b5158b28ad0d027864e576a6c3c4ed893645864830c5f78.exe 3012 76b0cc393ed6e80c4b5158b28ad0d027864e576a6c3c4ed893645864830c5f78.exe 3012 76b0cc393ed6e80c4b5158b28ad0d027864e576a6c3c4ed893645864830c5f78.exe 3012 76b0cc393ed6e80c4b5158b28ad0d027864e576a6c3c4ed893645864830c5f78.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\76b0cc393ed6e80c4b5158b28ad0d027864e576a6c3c4ed893645864830c5f78.exe"C:\Users\Admin\AppData\Local\Temp\76b0cc393ed6e80c4b5158b28ad0d027864e576a6c3c4ed893645864830c5f78.exe"1⤵
- Drops desktop.ini file(s)
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282B
MD59e36cc3537ee9ee1e3b10fa4e761045b
SHA17726f55012e1e26cc762c9982e7c6c54ca7bb303
SHA2564b9d687ac625690fd026ed4b236dad1cac90ef69e7ad256cc42766a065b50026
SHA5125f92493c533d3add10b4ce2a364624817ebd10e32daa45ee16593e913073602db5e339430a3f7d2c44abf250e96ca4e679f1f09f8ca807d58a47cf3d5c9c3790