Analysis

  • max time kernel
    119s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    08/10/2023, 01:33

General

  • Target

    2cbae886ed8ed486d4c2dc38f80f99757cda7f18a6e467474d2f947d2d44c178.exe

  • Size

    1.4MB

  • MD5

    c3c35f756750d58ac592430aa5c76b86

  • SHA1

    a12f768e606dc649dcb6e7169ec2534ff70773e1

  • SHA256

    2cbae886ed8ed486d4c2dc38f80f99757cda7f18a6e467474d2f947d2d44c178

  • SHA512

    92ee0b9734a8d11a1d8d34b4b157bf6be37f6120ae56c140e0b59939e5d07ffc593cc758aad7bb5a0c8e552a0960e72751b381edfadc04e679a0f227c9e13a85

  • SSDEEP

    24576:9yntD8t2cKvn3QCAUYZta7XSSSQyl7iQ0SCGlAYjiCKGijdyp0JAHkYS+CKGijd1:9+tTcKYAYCrSH7iwC9JCKGijdyp0JAHl

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2cbae886ed8ed486d4c2dc38f80f99757cda7f18a6e467474d2f947d2d44c178.exe
    "C:\Users\Admin\AppData\Local\Temp\2cbae886ed8ed486d4c2dc38f80f99757cda7f18a6e467474d2f947d2d44c178.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of SetWindowsHookEx
    PID:1896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads