Analysis

  • max time kernel
    121s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    07-11-2023 16:04

General

  • Target

    58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe

  • Size

    1.9MB

  • MD5

    20ec40cf51b72055a91e2233f901b82c

  • SHA1

    d995f6af37a28ce912c2cdec74c8419fb22f9962

  • SHA256

    58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664

  • SHA512

    212afde272dd61b9f0ed78e18c818dbdd6c8bf8b8f149f342f69e20eaeb84a7c007b0819cfca51d83a250496d1883e86a0aee6516fd43c14445f4f94321cbad9

  • SSDEEP

    49152:ozXeC3Q1XEEAQ55PAyNpmm4GUb66bjtzcqJ/JyGbzQ6:YtQ10EP55PAyl4bb6cthRyGY6

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: RenamesItself 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe
    "C:\Users\Admin\AppData\Local\Temp\58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Users\Admin\AppData\Local\Temp\58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe
      "C:\Users\Admin\AppData\Local\Temp\58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe" 2264
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Users\Admin\AppData\Local\Temp\data\Bugreport-590322.dll
        C:\Users\Admin\AppData\Local\Temp\data\Bugreport-590322.dll Bugreport %E9%AA%A8%E5%A4%B4QQ%E9%99%8C%E7%94%9F%E7%A9%BA%E9%97%B4%E7%95%99%E7%97%95%E8%B5%9E%20
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe

    Filesize

    1.9MB

    MD5

    f41246250bf75b16de32a896efa1675e

    SHA1

    c8e27c4dc3bc709dbd341fa93ea1a08cea34e88a

    SHA256

    fa121aabc7462d20f6dcdda4823333ba5bbde9bf967c415353b2c91c8cf537fd

    SHA512

    008e6f15ebecc027005c5639d5b7e40d8a5d95929508ae161694c0f2ab543106f36f3604422d5d0b04c1619907ca07937781694106349545e2daba6ce74595d3

  • C:\Users\Admin\AppData\Local\Temp\58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe

    Filesize

    1.9MB

    MD5

    f41246250bf75b16de32a896efa1675e

    SHA1

    c8e27c4dc3bc709dbd341fa93ea1a08cea34e88a

    SHA256

    fa121aabc7462d20f6dcdda4823333ba5bbde9bf967c415353b2c91c8cf537fd

    SHA512

    008e6f15ebecc027005c5639d5b7e40d8a5d95929508ae161694c0f2ab543106f36f3604422d5d0b04c1619907ca07937781694106349545e2daba6ce74595d3

  • C:\Users\Admin\AppData\Local\Temp\58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe

    Filesize

    1.9MB

    MD5

    f41246250bf75b16de32a896efa1675e

    SHA1

    c8e27c4dc3bc709dbd341fa93ea1a08cea34e88a

    SHA256

    fa121aabc7462d20f6dcdda4823333ba5bbde9bf967c415353b2c91c8cf537fd

    SHA512

    008e6f15ebecc027005c5639d5b7e40d8a5d95929508ae161694c0f2ab543106f36f3604422d5d0b04c1619907ca07937781694106349545e2daba6ce74595d3

  • C:\Users\Admin\AppData\Local\Temp\data\Bugreport-590322.dll

    Filesize

    168KB

    MD5

    43be7626394c21d1fd281ec41ff21617

    SHA1

    b25237e8523a77ab5d972c027854d6f1411bbb62

    SHA256

    b201e8c170a6b1dbd4c6d4da04c18e956070e6b2c46d647a63a094252cea6984

    SHA512

    8d08fc8cb8d351be32330886376a2a91e53d064b0e880396c93e104fcf1e15f8f64295f77e849f39d27a69717eec5106dfd1aebdc499af16b65567e3e61cd19e

  • C:\Users\Admin\AppData\Local\Temp\data\Bugreport-590322.dll

    Filesize

    168KB

    MD5

    43be7626394c21d1fd281ec41ff21617

    SHA1

    b25237e8523a77ab5d972c027854d6f1411bbb62

    SHA256

    b201e8c170a6b1dbd4c6d4da04c18e956070e6b2c46d647a63a094252cea6984

    SHA512

    8d08fc8cb8d351be32330886376a2a91e53d064b0e880396c93e104fcf1e15f8f64295f77e849f39d27a69717eec5106dfd1aebdc499af16b65567e3e61cd19e

  • C:\Users\Admin\AppData\Local\Temp\data\Bugreport.ini

    Filesize

    113B

    MD5

    f3bd78ac84568ae7290b806399a1cada

    SHA1

    9b269e5c32d9985a73a4d270337cedb8e1ff480b

    SHA256

    091892ff0788a1169cd6d5810d13a41248bb4059c4cec77c59e4d64660579e3c

    SHA512

    51f6546073285c8453debaa9f9f2631d9ab845abcc34a04a3dbf1de462a351ecd828b8e44f1fcaadbf071d86921bfec7a192cd355fd504c7f4ffbc690dc2c15d

  • C:\Users\Admin\AppData\Local\Temp\data\Bugreport_error.ini

    Filesize

    133B

    MD5

    d76ff64be1c3bfa1466c4ce4f85279bf

    SHA1

    0636ec586cbabc9ed8dd539d24bfb47b1d04a489

    SHA256

    c861a7a4ef5b0095cd476928e74f63d1a9ed7caadc7431d70aa8d8bc0b132f99

    SHA512

    01a162d0137bff087945673006d0e9a41251cade77cc0a522d76ac1a2570b1761cd16625e50c0420a84a9da2c0b596fb7cb0ce29047df1b349b9b0be32a3eaf1

  • C:\Users\Admin\AppData\Local\Temp\data\ÕʺÅÁбí.PLFX

    Filesize

    548B

    MD5

    dbbbff50292825eae4e994e639ab267c

    SHA1

    38ac3c177675572d7cf91c4b083b46b2265b34c2

    SHA256

    339331e02bf441039b3b8773559bfe7f6b6e9784b37c36ac7669d7c2a09a4105

    SHA512

    4028beb9fd2a0fc284a6123f5484c1e18dbf0e36e623bc9627f7ff3cb977a0ab8898573e9c1590437c147596b2fd772543bc0af3c0172fdb8cad049d6a90f9e9

  • C:\Users\Admin\AppData\Local\Temp\iext1.fnr.bbs.125.la

    Filesize

    724KB

    MD5

    a96fbd5e66b31f3d816ad80f623e9bd9

    SHA1

    4eda42260bd3eb930cd4eafd7d15c6af367bcf18

    SHA256

    2e67ba278646fde95bb614dcbcc7da1c6bf7976c918b2c6ad3d78640000326f3

    SHA512

    43921107313775ea14b1bd33cf758c13798f4fa1c1074771c1c96b1b43b98f3416d249ed8ab3171383772d0054829c3754a91b5e94135f1df6d67a76f599c80e

  • \Users\Admin\AppData\Local\Temp\58f9600be17409013e538296cfa6ae26d25bbf5b255be827bc03aad5f9e38664.exe

    Filesize

    1.9MB

    MD5

    f41246250bf75b16de32a896efa1675e

    SHA1

    c8e27c4dc3bc709dbd341fa93ea1a08cea34e88a

    SHA256

    fa121aabc7462d20f6dcdda4823333ba5bbde9bf967c415353b2c91c8cf537fd

    SHA512

    008e6f15ebecc027005c5639d5b7e40d8a5d95929508ae161694c0f2ab543106f36f3604422d5d0b04c1619907ca07937781694106349545e2daba6ce74595d3

  • \Users\Admin\AppData\Local\Temp\data\Bugreport-590322.dll

    Filesize

    168KB

    MD5

    43be7626394c21d1fd281ec41ff21617

    SHA1

    b25237e8523a77ab5d972c027854d6f1411bbb62

    SHA256

    b201e8c170a6b1dbd4c6d4da04c18e956070e6b2c46d647a63a094252cea6984

    SHA512

    8d08fc8cb8d351be32330886376a2a91e53d064b0e880396c93e104fcf1e15f8f64295f77e849f39d27a69717eec5106dfd1aebdc499af16b65567e3e61cd19e

  • \Users\Admin\AppData\Local\Temp\data\Bugreport-590322.dll

    Filesize

    168KB

    MD5

    43be7626394c21d1fd281ec41ff21617

    SHA1

    b25237e8523a77ab5d972c027854d6f1411bbb62

    SHA256

    b201e8c170a6b1dbd4c6d4da04c18e956070e6b2c46d647a63a094252cea6984

    SHA512

    8d08fc8cb8d351be32330886376a2a91e53d064b0e880396c93e104fcf1e15f8f64295f77e849f39d27a69717eec5106dfd1aebdc499af16b65567e3e61cd19e

  • \Users\Admin\AppData\Local\Temp\iext1.fnr.bbs.125.la

    Filesize

    724KB

    MD5

    a96fbd5e66b31f3d816ad80f623e9bd9

    SHA1

    4eda42260bd3eb930cd4eafd7d15c6af367bcf18

    SHA256

    2e67ba278646fde95bb614dcbcc7da1c6bf7976c918b2c6ad3d78640000326f3

    SHA512

    43921107313775ea14b1bd33cf758c13798f4fa1c1074771c1c96b1b43b98f3416d249ed8ab3171383772d0054829c3754a91b5e94135f1df6d67a76f599c80e

  • \Users\Admin\AppData\Local\Temp\iext1.fnr.bbs.125.la

    Filesize

    724KB

    MD5

    a96fbd5e66b31f3d816ad80f623e9bd9

    SHA1

    4eda42260bd3eb930cd4eafd7d15c6af367bcf18

    SHA256

    2e67ba278646fde95bb614dcbcc7da1c6bf7976c918b2c6ad3d78640000326f3

    SHA512

    43921107313775ea14b1bd33cf758c13798f4fa1c1074771c1c96b1b43b98f3416d249ed8ab3171383772d0054829c3754a91b5e94135f1df6d67a76f599c80e

  • memory/2264-65-0x0000000002B00000-0x0000000002B72000-memory.dmp

    Filesize

    456KB

  • memory/2264-30-0x0000000000400000-0x00000000008FE200-memory.dmp

    Filesize

    5.0MB

  • memory/2264-34-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2264-38-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2264-36-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2264-40-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2264-32-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2264-42-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2264-47-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2264-51-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2264-53-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2264-49-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2264-45-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2264-54-0x0000000002B00000-0x0000000002B72000-memory.dmp

    Filesize

    456KB

  • memory/2264-55-0x0000000002B00000-0x0000000002B72000-memory.dmp

    Filesize

    456KB

  • memory/2264-58-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2264-59-0x0000000000400000-0x00000000008FE200-memory.dmp

    Filesize

    5.0MB

  • memory/2264-19-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2264-21-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2264-70-0x0000000004BF0000-0x00000000050F0000-memory.dmp

    Filesize

    5.0MB

  • memory/2264-6-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2264-69-0x0000000000400000-0x00000000008FE200-memory.dmp

    Filesize

    5.0MB

  • memory/2264-28-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2264-0-0x0000000000400000-0x00000000008FE200-memory.dmp

    Filesize

    5.0MB

  • memory/2264-26-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2264-8-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2264-12-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2264-10-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2264-24-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2264-15-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2264-5-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2264-17-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2264-7-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2760-87-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2760-133-0x0000000002A40000-0x0000000002AB2000-memory.dmp

    Filesize

    456KB

  • memory/2760-93-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2760-98-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2760-100-0x0000000000400000-0x00000000008FF200-memory.dmp

    Filesize

    5.0MB

  • memory/2760-102-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2760-106-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2760-110-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2760-114-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2760-117-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2760-120-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2760-123-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2760-126-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2760-129-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2760-132-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2760-90-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2760-134-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2760-148-0x0000000002A40000-0x0000000002AB2000-memory.dmp

    Filesize

    456KB

  • memory/2760-85-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2760-150-0x0000000004E60000-0x0000000004E99000-memory.dmp

    Filesize

    228KB

  • memory/2760-7349-0x0000000002A40000-0x0000000002AB2000-memory.dmp

    Filesize

    456KB

  • memory/2760-83-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2760-81-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2760-79-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2760-76-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2760-77-0x0000000010000000-0x000000001003F000-memory.dmp

    Filesize

    252KB

  • memory/2760-7348-0x0000000004E60000-0x0000000004E99000-memory.dmp

    Filesize

    228KB

  • memory/2760-171-0x00000000022B0000-0x00000000022B1000-memory.dmp

    Filesize

    4KB

  • memory/2760-71-0x0000000000400000-0x00000000008FF200-memory.dmp

    Filesize

    5.0MB

  • memory/2760-7347-0x0000000000400000-0x00000000008FF200-memory.dmp

    Filesize

    5.0MB

  • memory/2992-168-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2992-151-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB