Analysis
-
max time kernel
121s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
07-11-2023 16:04
Behavioral task
behavioral1
Sample
58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe
Resource
win10v2004-20231020-en
General
-
Target
58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe
-
Size
1.9MB
-
MD5
20ec40cf51b72055a91e2233f901b82c
-
SHA1
d995f6af37a28ce912c2cdec74c8419fb22f9962
-
SHA256
58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664
-
SHA512
212afde272dd61b9f0ed78e18c818dbdd6c8bf8b8f149f342f69e20eaeb84a7c007b0819cfca51d83a250496d1883e86a0aee6516fd43c14445f4f94321cbad9
-
SSDEEP
49152:ozXeC3Q1XEEAQ55PAyNpmm4GUb66bjtzcqJ/JyGbzQ6:YtQ10EP55PAyl4bb6cthRyGY6
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2760 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe 2992 Bugreport-590322.dll -
Loads dropped DLL 5 IoCs
pid Process 2264 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe 2264 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe 2760 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe 2760 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe 2760 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe -
resource yara_rule behavioral1/memory/2264-0-0x0000000000400000-0x00000000008FE200-memory.dmp upx behavioral1/memory/2264-6-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2264-8-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2264-12-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2264-10-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2264-15-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2264-17-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2264-7-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2264-5-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2264-24-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2264-26-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2264-28-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2264-21-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2264-30-0x0000000000400000-0x00000000008FE200-memory.dmp upx behavioral1/memory/2264-19-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2264-34-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2264-38-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2264-36-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2264-40-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2264-32-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2264-42-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2264-47-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2264-51-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2264-53-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2264-49-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2264-45-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2264-54-0x0000000002B00000-0x0000000002B72000-memory.dmp upx behavioral1/memory/2264-55-0x0000000002B00000-0x0000000002B72000-memory.dmp upx behavioral1/memory/2264-58-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2264-59-0x0000000000400000-0x00000000008FE200-memory.dmp upx behavioral1/files/0x0007000000016c25-63.dat upx behavioral1/files/0x0007000000016c25-68.dat upx behavioral1/memory/2264-70-0x0000000004BF0000-0x00000000050F0000-memory.dmp upx behavioral1/memory/2760-71-0x0000000000400000-0x00000000008FF200-memory.dmp upx behavioral1/memory/2264-69-0x0000000000400000-0x00000000008FE200-memory.dmp upx behavioral1/files/0x0007000000016c25-66.dat upx behavioral1/memory/2264-65-0x0000000002B00000-0x0000000002B72000-memory.dmp upx behavioral1/files/0x0007000000016c25-75.dat upx behavioral1/memory/2760-77-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2760-76-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2760-79-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2760-81-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2760-83-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2760-85-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2760-87-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2760-90-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2760-93-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2760-98-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2760-100-0x0000000000400000-0x00000000008FF200-memory.dmp upx behavioral1/memory/2760-102-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2760-106-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2760-110-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2760-114-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2760-117-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2760-120-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2760-123-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2760-126-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2760-129-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2760-132-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2760-133-0x0000000002A40000-0x0000000002AB2000-memory.dmp upx behavioral1/memory/2760-134-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2760-148-0x0000000002A40000-0x0000000002AB2000-memory.dmp upx behavioral1/memory/2760-7347-0x0000000000400000-0x00000000008FF200-memory.dmp upx behavioral1/memory/2760-7349-0x0000000002A40000-0x0000000002AB2000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2084844033-2744876406-2053742436-1000\Software\Microsoft\Internet Explorer\Main 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2264 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe 2264 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe 2760 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe 2760 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe -
Suspicious behavior: RenamesItself 2 IoCs
pid Process 2264 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe 2264 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2264 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe 2264 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe 2264 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe 2760 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe 2760 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe 2760 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe 2760 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe 2760 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe 2760 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe 2992 Bugreport-590322.dll -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2760 2264 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe 28 PID 2264 wrote to memory of 2760 2264 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe 28 PID 2264 wrote to memory of 2760 2264 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe 28 PID 2264 wrote to memory of 2760 2264 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe 28 PID 2760 wrote to memory of 2992 2760 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe 33 PID 2760 wrote to memory of 2992 2760 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe 33 PID 2760 wrote to memory of 2992 2760 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe 33 PID 2760 wrote to memory of 2992 2760 58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe"C:\Users\Admin\AppData\Local\Temp\58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe"C:\Users\Admin\AppData\Local\Temp\58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe" 22642⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\data\Bugreport-590322.dllC:\Users\Admin\AppData\Local\Temp\data\Bugreport-590322.dll Bugreport %E9%AA%A8%E5%A4%B4QQ%E9%99%8C%E7%94%9F%E7%A9%BA%E9%97%B4%E7%95%99%E7%97%95%E8%B5%9E%203⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2992
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe
Filesize1.9MB
MD5f41246250bf75b16de32a896efa1675e
SHA1c8e27c4dc3bc709dbd341fa93ea1a08cea34e88a
SHA256fa121aabc7462d20f6dcdda4823333ba5bbde9bf967c415353b2c91c8cf537fd
SHA512008e6f15ebecc027005c5639d5b7e40d8a5d95929508ae161694c0f2ab543106f36f3604422d5d0b04c1619907ca07937781694106349545e2daba6ce74595d3
-
C:\Users\Admin\AppData\Local\Temp\58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe
Filesize1.9MB
MD5f41246250bf75b16de32a896efa1675e
SHA1c8e27c4dc3bc709dbd341fa93ea1a08cea34e88a
SHA256fa121aabc7462d20f6dcdda4823333ba5bbde9bf967c415353b2c91c8cf537fd
SHA512008e6f15ebecc027005c5639d5b7e40d8a5d95929508ae161694c0f2ab543106f36f3604422d5d0b04c1619907ca07937781694106349545e2daba6ce74595d3
-
C:\Users\Admin\AppData\Local\Temp\58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe
Filesize1.9MB
MD5f41246250bf75b16de32a896efa1675e
SHA1c8e27c4dc3bc709dbd341fa93ea1a08cea34e88a
SHA256fa121aabc7462d20f6dcdda4823333ba5bbde9bf967c415353b2c91c8cf537fd
SHA512008e6f15ebecc027005c5639d5b7e40d8a5d95929508ae161694c0f2ab543106f36f3604422d5d0b04c1619907ca07937781694106349545e2daba6ce74595d3
-
Filesize
168KB
MD543be7626394c21d1fd281ec41ff21617
SHA1b25237e8523a77ab5d972c027854d6f1411bbb62
SHA256b201e8c170a6b1dbd4c6d4da04c18e956070e6b2c46d647a63a094252cea6984
SHA5128d08fc8cb8d351be32330886376a2a91e53d064b0e880396c93e104fcf1e15f8f64295f77e849f39d27a69717eec5106dfd1aebdc499af16b65567e3e61cd19e
-
Filesize
168KB
MD543be7626394c21d1fd281ec41ff21617
SHA1b25237e8523a77ab5d972c027854d6f1411bbb62
SHA256b201e8c170a6b1dbd4c6d4da04c18e956070e6b2c46d647a63a094252cea6984
SHA5128d08fc8cb8d351be32330886376a2a91e53d064b0e880396c93e104fcf1e15f8f64295f77e849f39d27a69717eec5106dfd1aebdc499af16b65567e3e61cd19e
-
Filesize
113B
MD5f3bd78ac84568ae7290b806399a1cada
SHA19b269e5c32d9985a73a4d270337cedb8e1ff480b
SHA256091892ff0788a1169cd6d5810d13a41248bb4059c4cec77c59e4d64660579e3c
SHA51251f6546073285c8453debaa9f9f2631d9ab845abcc34a04a3dbf1de462a351ecd828b8e44f1fcaadbf071d86921bfec7a192cd355fd504c7f4ffbc690dc2c15d
-
Filesize
133B
MD5d76ff64be1c3bfa1466c4ce4f85279bf
SHA10636ec586cbabc9ed8dd539d24bfb47b1d04a489
SHA256c861a7a4ef5b0095cd476928e74f63d1a9ed7caadc7431d70aa8d8bc0b132f99
SHA51201a162d0137bff087945673006d0e9a41251cade77cc0a522d76ac1a2570b1761cd16625e50c0420a84a9da2c0b596fb7cb0ce29047df1b349b9b0be32a3eaf1
-
Filesize
548B
MD5dbbbff50292825eae4e994e639ab267c
SHA138ac3c177675572d7cf91c4b083b46b2265b34c2
SHA256339331e02bf441039b3b8773559bfe7f6b6e9784b37c36ac7669d7c2a09a4105
SHA5124028beb9fd2a0fc284a6123f5484c1e18dbf0e36e623bc9627f7ff3cb977a0ab8898573e9c1590437c147596b2fd772543bc0af3c0172fdb8cad049d6a90f9e9
-
Filesize
724KB
MD5a96fbd5e66b31f3d816ad80f623e9bd9
SHA14eda42260bd3eb930cd4eafd7d15c6af367bcf18
SHA2562e67ba278646fde95bb614dcbcc7da1c6bf7976c918b2c6ad3d78640000326f3
SHA51243921107313775ea14b1bd33cf758c13798f4fa1c1074771c1c96b1b43b98f3416d249ed8ab3171383772d0054829c3754a91b5e94135f1df6d67a76f599c80e
-
\Users\Admin\AppData\Local\Temp\58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe
Filesize1.9MB
MD5f41246250bf75b16de32a896efa1675e
SHA1c8e27c4dc3bc709dbd341fa93ea1a08cea34e88a
SHA256fa121aabc7462d20f6dcdda4823333ba5bbde9bf967c415353b2c91c8cf537fd
SHA512008e6f15ebecc027005c5639d5b7e40d8a5d95929508ae161694c0f2ab543106f36f3604422d5d0b04c1619907ca07937781694106349545e2daba6ce74595d3
-
Filesize
168KB
MD543be7626394c21d1fd281ec41ff21617
SHA1b25237e8523a77ab5d972c027854d6f1411bbb62
SHA256b201e8c170a6b1dbd4c6d4da04c18e956070e6b2c46d647a63a094252cea6984
SHA5128d08fc8cb8d351be32330886376a2a91e53d064b0e880396c93e104fcf1e15f8f64295f77e849f39d27a69717eec5106dfd1aebdc499af16b65567e3e61cd19e
-
Filesize
168KB
MD543be7626394c21d1fd281ec41ff21617
SHA1b25237e8523a77ab5d972c027854d6f1411bbb62
SHA256b201e8c170a6b1dbd4c6d4da04c18e956070e6b2c46d647a63a094252cea6984
SHA5128d08fc8cb8d351be32330886376a2a91e53d064b0e880396c93e104fcf1e15f8f64295f77e849f39d27a69717eec5106dfd1aebdc499af16b65567e3e61cd19e
-
Filesize
724KB
MD5a96fbd5e66b31f3d816ad80f623e9bd9
SHA14eda42260bd3eb930cd4eafd7d15c6af367bcf18
SHA2562e67ba278646fde95bb614dcbcc7da1c6bf7976c918b2c6ad3d78640000326f3
SHA51243921107313775ea14b1bd33cf758c13798f4fa1c1074771c1c96b1b43b98f3416d249ed8ab3171383772d0054829c3754a91b5e94135f1df6d67a76f599c80e
-
Filesize
724KB
MD5a96fbd5e66b31f3d816ad80f623e9bd9
SHA14eda42260bd3eb930cd4eafd7d15c6af367bcf18
SHA2562e67ba278646fde95bb614dcbcc7da1c6bf7976c918b2c6ad3d78640000326f3
SHA51243921107313775ea14b1bd33cf758c13798f4fa1c1074771c1c96b1b43b98f3416d249ed8ab3171383772d0054829c3754a91b5e94135f1df6d67a76f599c80e