Analysis
-
max time kernel
143s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02/10/2023, 11:52
Static task
static1
Behavioral task
behavioral1
Sample
c4129b796638135f24c7c051eea530a599318d0b664341bf6bbab37c177375ac.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c4129b796638135f24c7c051eea530a599318d0b664341bf6bbab37c177375ac.exe
Resource
win10v2004-20230915-en
General
-
Target
c4129b796638135f24c7c051eea530a599318d0b664341bf6bbab37c177375ac.exe
-
Size
8.8MB
-
MD5
f63fab155ae39a3e59a91a055f5e4418
-
SHA1
58fdaee032dfaafbad3128484eae75c751f5b4e6
-
SHA256
c4129b796638135f24c7c051eea530a599318d0b664341bf6bbab37c177375ac
-
SHA512
d4ebbf67f63cf00b9c7571ac2d28109ffe4ca82c92a1f601261a440fdb3cb762f111fc433ffa6f6a0d9a148f1a9b26ace632562d1f853965335c60a5d446a2bd
-
SSDEEP
196608:wTGOaN/JahF9zGy5ToY9p5Jyqmfx1EgZt:4GOMA4y7pSv51
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2692 evb4B73.tmp -
Loads dropped DLL 1 IoCs
pid Process 2684 c4129b796638135f24c7c051eea530a599318d0b664341bf6bbab37c177375ac.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 evb4B73.tmp -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2684 set thread context of 2692 2684 c4129b796638135f24c7c051eea530a599318d0b664341bf6bbab37c177375ac.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2692 evb4B73.tmp -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2692 2684 c4129b796638135f24c7c051eea530a599318d0b664341bf6bbab37c177375ac.exe 28 PID 2684 wrote to memory of 2692 2684 c4129b796638135f24c7c051eea530a599318d0b664341bf6bbab37c177375ac.exe 28 PID 2684 wrote to memory of 2692 2684 c4129b796638135f24c7c051eea530a599318d0b664341bf6bbab37c177375ac.exe 28 PID 2684 wrote to memory of 2692 2684 c4129b796638135f24c7c051eea530a599318d0b664341bf6bbab37c177375ac.exe 28 PID 2684 wrote to memory of 2692 2684 c4129b796638135f24c7c051eea530a599318d0b664341bf6bbab37c177375ac.exe 28 PID 2684 wrote to memory of 2692 2684 c4129b796638135f24c7c051eea530a599318d0b664341bf6bbab37c177375ac.exe 28 PID 2684 wrote to memory of 2692 2684 c4129b796638135f24c7c051eea530a599318d0b664341bf6bbab37c177375ac.exe 28 PID 2684 wrote to memory of 2692 2684 c4129b796638135f24c7c051eea530a599318d0b664341bf6bbab37c177375ac.exe 28 PID 2684 wrote to memory of 2692 2684 c4129b796638135f24c7c051eea530a599318d0b664341bf6bbab37c177375ac.exe 28 PID 2684 wrote to memory of 2692 2684 c4129b796638135f24c7c051eea530a599318d0b664341bf6bbab37c177375ac.exe 28 PID 2684 wrote to memory of 2692 2684 c4129b796638135f24c7c051eea530a599318d0b664341bf6bbab37c177375ac.exe 28 PID 2684 wrote to memory of 2692 2684 c4129b796638135f24c7c051eea530a599318d0b664341bf6bbab37c177375ac.exe 28 PID 2684 wrote to memory of 2692 2684 c4129b796638135f24c7c051eea530a599318d0b664341bf6bbab37c177375ac.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4129b796638135f24c7c051eea530a599318d0b664341bf6bbab37c177375ac.exe"C:\Users\Admin\AppData\Local\Temp\c4129b796638135f24c7c051eea530a599318d0b664341bf6bbab37c177375ac.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\evb4B73.tmp"C:\Users\Admin\AppData\Local\Temp\360safe\netmon\360NetRepair.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5709e0cde358b47c6e4baa7467f7717e2
SHA18744cad1d1a7319e73f5184f1e4ae82a779c57d4
SHA2560754f651e47cb2cba0677b549eb879556fdabb859eace371cb34aa22fee98bf3
SHA51207d4faed2a7b6d05143b6ba0460511a1b051efe687daa1f37b11016b2ffa00f260dc7bcd5d1bfd4bc802f65c4486e89af023a4aef7670ae117b2de7d658c8075
-
Filesize
1KB
MD5709e0cde358b47c6e4baa7467f7717e2
SHA18744cad1d1a7319e73f5184f1e4ae82a779c57d4
SHA2560754f651e47cb2cba0677b549eb879556fdabb859eace371cb34aa22fee98bf3
SHA51207d4faed2a7b6d05143b6ba0460511a1b051efe687daa1f37b11016b2ffa00f260dc7bcd5d1bfd4bc802f65c4486e89af023a4aef7670ae117b2de7d658c8075
-
Filesize
1KB
MD5ebc3f68f547997314ddc6ecdb167e076
SHA18db47a776b0bd36a48211ce3cf61cd59641fbef9
SHA2563fd63ad7d8226e23128e32dbb323672a73e1fbfc05a4ef45ef1c268e2990d305
SHA512f41786fb4dbc4fae3a07deb4956aa5d85c90dacff71ed76e0e38c1b6712cd43175a7f2715d3cab75e1fb1c834d18fbfa365f158d71f072c522ac2ee132a0f54f
-
Filesize
1KB
MD5709e0cde358b47c6e4baa7467f7717e2
SHA18744cad1d1a7319e73f5184f1e4ae82a779c57d4
SHA2560754f651e47cb2cba0677b549eb879556fdabb859eace371cb34aa22fee98bf3
SHA51207d4faed2a7b6d05143b6ba0460511a1b051efe687daa1f37b11016b2ffa00f260dc7bcd5d1bfd4bc802f65c4486e89af023a4aef7670ae117b2de7d658c8075