Analysis

  • max time kernel
    147s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 10:50

General

  • Target

    876439546a245e645e0ca86ce787534e2ee210a413c071e4c19d2ef6507fb6b2.exe

  • Size

    4.2MB

  • MD5

    0813d5f211a6630fddbf1781a6a63fd3

  • SHA1

    9ac99d51b6566062bdf1388f3a5888ebbf93094a

  • SHA256

    876439546a245e645e0ca86ce787534e2ee210a413c071e4c19d2ef6507fb6b2

  • SHA512

    b2ac49d0577453f42f58578f6d195c2991baaeca6a1ccdcce9ea01dd30c243581e729da39cd457f67721dc2b8dd665cd23e9fe8227ddfe2080f6312cb9276705

  • SSDEEP

    98304:qcPOrH3y3MUAYsIdGjBMDIlT6BQAYJ4GBsomIhylpYmoh:qmMk0jq0AIJ4r76IiFh

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Program crash 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\876439546a245e645e0ca86ce787534e2ee210a413c071e4c19d2ef6507fb6b2.exe
    "C:\Users\Admin\AppData\Local\Temp\876439546a245e645e0ca86ce787534e2ee210a413c071e4c19d2ef6507fb6b2.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:4380
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 264
      2⤵
      • Program crash
      PID:1812
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4380 -ip 4380
    1⤵
      PID:1592

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/4380-0-0x0000000000400000-0x0000000000A8B000-memory.dmp

            Filesize

            6.5MB

          • memory/4380-1-0x00000000027A0000-0x0000000002873000-memory.dmp

            Filesize

            844KB

          • memory/4380-2-0x0000000000400000-0x0000000000A8B000-memory.dmp

            Filesize

            6.5MB

          • memory/4380-3-0x00000000027A0000-0x0000000002873000-memory.dmp

            Filesize

            844KB