Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    04/09/2023, 15:35

General

  • Target

    c4fa10c81b0ebd11a3bc7f0753c34fed1e0eeba05c501414b7afa0e1812f64aa.exe

  • Size

    6.5MB

  • MD5

    2c866ef97912a76b0d85df257285c832

  • SHA1

    071439e4d1b60301c1e36653f721ce33d188f762

  • SHA256

    c4fa10c81b0ebd11a3bc7f0753c34fed1e0eeba05c501414b7afa0e1812f64aa

  • SHA512

    fbcbb51e3c5d323dcfa29acdf8144a378aea67e2715ef3c30075166755319fc5ceab2732b606e4c1b48261f47fd362df0f0463584cfd390a4e502a5f3214f65c

  • SSDEEP

    49152:/RjN5gspNyg2+lQi3iBpbhTLZll0SNHDwQDQSJSEk9ShGcMgqqowK4WKFx+RGbKu:/wH5otmfiuEDh3j4SmXzu

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4fa10c81b0ebd11a3bc7f0753c34fed1e0eeba05c501414b7afa0e1812f64aa.exe
    "C:\Users\Admin\AppData\Local\Temp\c4fa10c81b0ebd11a3bc7f0753c34fed1e0eeba05c501414b7afa0e1812f64aa.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2168

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2168-0-0x0000000074070000-0x000000007475E000-memory.dmp

          Filesize

          6.9MB

        • memory/2168-1-0x0000000001050000-0x00000000016D8000-memory.dmp

          Filesize

          6.5MB

        • memory/2168-2-0x0000000000EC0000-0x0000000000F00000-memory.dmp

          Filesize

          256KB

        • memory/2168-3-0x0000000006430000-0x00000000066DA000-memory.dmp

          Filesize

          2.7MB

        • memory/2168-4-0x0000000000EC0000-0x0000000000F00000-memory.dmp

          Filesize

          256KB

        • memory/2168-5-0x0000000000EC0000-0x0000000000F00000-memory.dmp

          Filesize

          256KB

        • memory/2168-6-0x0000000000E90000-0x0000000000E96000-memory.dmp

          Filesize

          24KB

        • memory/2168-7-0x000000000AE00000-0x000000000B5A6000-memory.dmp

          Filesize

          7.6MB

        • memory/2168-13-0x0000000074070000-0x000000007475E000-memory.dmp

          Filesize

          6.9MB

        • memory/2168-14-0x0000000000EC0000-0x0000000000F00000-memory.dmp

          Filesize

          256KB