Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2023, 06:46

General

  • Target

    76b0cc393ed6e80c4b5158b28ad0d027864e576a6c3c4ed893645864830c5f78.exe

  • Size

    1.5MB

  • MD5

    470cde2e63400089da209339568caf9d

  • SHA1

    54156457a012ffd0cba58fb4b1b71e7258dc2f66

  • SHA256

    76b0cc393ed6e80c4b5158b28ad0d027864e576a6c3c4ed893645864830c5f78

  • SHA512

    f96f8c33a3520b0e324a30dd425ad120b5279124f317cbc7c60c9ef46f02a28eecd75c7681f83fe001b1a5af26f18870b25127ab6dc0ddae40cfc8f40e3c8ada

  • SSDEEP

    24576:OFehbMLd183OLsdTcQnKi9chWQFZVtqne3PzRBV29s937FHBkBcM2lE4ZEbL0HzS:OmbtcU12296FhplEmSkfdkP

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\76b0cc393ed6e80c4b5158b28ad0d027864e576a6c3c4ed893645864830c5f78.exe
    "C:\Users\Admin\AppData\Local\Temp\76b0cc393ed6e80c4b5158b28ad0d027864e576a6c3c4ed893645864830c5f78.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Writes to the Master Boot Record (MBR)
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1332

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\Desktop\desktop.ini

          Filesize

          282B

          MD5

          9e36cc3537ee9ee1e3b10fa4e761045b

          SHA1

          7726f55012e1e26cc762c9982e7c6c54ca7bb303

          SHA256

          4b9d687ac625690fd026ed4b236dad1cac90ef69e7ad256cc42766a065b50026

          SHA512

          5f92493c533d3add10b4ce2a364624817ebd10e32daa45ee16593e913073602db5e339430a3f7d2c44abf250e96ca4e679f1f09f8ca807d58a47cf3d5c9c3790

        • memory/1332-0-0x0000000002330000-0x0000000002331000-memory.dmp

          Filesize

          4KB

        • memory/1332-1-0x0000000000400000-0x0000000000594000-memory.dmp

          Filesize

          1.6MB

        • memory/1332-2-0x0000000002330000-0x0000000002331000-memory.dmp

          Filesize

          4KB

        • memory/1332-49-0x0000000010000000-0x0000000010102000-memory.dmp

          Filesize

          1.0MB

        • memory/1332-52-0x0000000010000000-0x0000000010102000-memory.dmp

          Filesize

          1.0MB

        • memory/1332-53-0x0000000000400000-0x0000000000594000-memory.dmp

          Filesize

          1.6MB

        • memory/1332-54-0x0000000010000000-0x0000000010102000-memory.dmp

          Filesize

          1.0MB