Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-10-2023 02:18

General

  • Target

    8cba1df61caccb2163f09be893bf76d81991074d9dd08bfafffcb73b535e62ce.exe

  • Size

    11.6MB

  • MD5

    10b7e64c9f63c28c6816630ce41c0d28

  • SHA1

    46e37806c73f6b00b638fc41e5221aa67ca49c92

  • SHA256

    8cba1df61caccb2163f09be893bf76d81991074d9dd08bfafffcb73b535e62ce

  • SHA512

    be199294a9ca9e2fed15afc4be0b508f3106e994ded347b67acda0d93f928bc283334437ac583fe3344e764c904a0b964bce9c6253b72584791a65f23f480e82

  • SSDEEP

    196608:ltpHEGZla4YxmDuStYKQM4e1upVcZvQfffHQVWXFQ4T3kniKJzV/k6Mp48ehR:lthdsmiKue14VcZvyQVWXFQjniKJzV/9

Malware Config

Signatures

  • UPX packed file 26 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8cba1df61caccb2163f09be893bf76d81991074d9dd08bfafffcb73b535e62ce.exe
    "C:\Users\Admin\AppData\Local\Temp\8cba1df61caccb2163f09be893bf76d81991074d9dd08bfafffcb73b535e62ce.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4132-0-0x0000000000400000-0x0000000001F2C000-memory.dmp

    Filesize

    27.2MB

  • memory/4132-2-0x0000000002100000-0x0000000002101000-memory.dmp

    Filesize

    4KB

  • memory/4132-1-0x00000000020F0000-0x00000000020F1000-memory.dmp

    Filesize

    4KB

  • memory/4132-3-0x0000000002110000-0x0000000002111000-memory.dmp

    Filesize

    4KB

  • memory/4132-4-0x00000000026D0000-0x00000000026D1000-memory.dmp

    Filesize

    4KB

  • memory/4132-5-0x00000000026E0000-0x00000000026E1000-memory.dmp

    Filesize

    4KB

  • memory/4132-6-0x0000000003D10000-0x0000000003D11000-memory.dmp

    Filesize

    4KB

  • memory/4132-7-0x0000000003D20000-0x0000000003D21000-memory.dmp

    Filesize

    4KB

  • memory/4132-11-0x0000000004050000-0x000000000405B000-memory.dmp

    Filesize

    44KB

  • memory/4132-12-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4132-14-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4132-15-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4132-18-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4132-21-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4132-23-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4132-25-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4132-27-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4132-30-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4132-29-0x0000000000400000-0x0000000001F2C000-memory.dmp

    Filesize

    27.2MB

  • memory/4132-32-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4132-34-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4132-36-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4132-38-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4132-40-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4132-42-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4132-43-0x0000000004050000-0x000000000405B000-memory.dmp

    Filesize

    44KB

  • memory/4132-45-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4132-47-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4132-49-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4132-51-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4132-53-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4132-56-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4132-58-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4132-60-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4132-61-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/4132-62-0x0000000004070000-0x0000000004071000-memory.dmp

    Filesize

    4KB

  • memory/4132-63-0x0000000004080000-0x0000000004081000-memory.dmp

    Filesize

    4KB

  • memory/4132-65-0x0000000004130000-0x0000000004131000-memory.dmp

    Filesize

    4KB

  • memory/4132-64-0x0000000004140000-0x0000000004141000-memory.dmp

    Filesize

    4KB

  • memory/4132-75-0x0000000000400000-0x0000000001F2C000-memory.dmp

    Filesize

    27.2MB