Analysis

  • max time kernel
    122s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    08-11-2023 03:15

General

  • Target

    Bootkits/6b0cd074a6c556f4d1fe0088c15160eb13f847974c4307f9eeeea4dc33d49286.exe

  • Size

    83KB

  • MD5

    64e1aa6f5dca669ba51678157058d54b

  • SHA1

    9f6df0a011748160b0c18fb2b44ebe9fa9d517e9

  • SHA256

    6b0cd074a6c556f4d1fe0088c15160eb13f847974c4307f9eeeea4dc33d49286

  • SHA512

    91f5cc1aba9b26a16e7b9e082c2982f71fe9996be9072f0252a2864894904fec57b65b6d1dae98274df2fe3e4ab4626364040e16802fa5ccf152b71228b54c0d

  • SSDEEP

    1536:esDWvcIU3ayXD1D12E5G9JR0+iGxxUWfdOzq3bdPOoH6LBqtgkdd+4MxUAsKliwZ:WeayXIJR0hGvTfMwfaLBViYUAzF

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bootkits\6b0cd074a6c556f4d1fe0088c15160eb13f847974c4307f9eeeea4dc33d49286.exe
    "C:\Users\Admin\AppData\Local\Temp\Bootkits\6b0cd074a6c556f4d1fe0088c15160eb13f847974c4307f9eeeea4dc33d49286.exe"
    1⤵
    • Maps connected drives based on registry
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\Bootkits\6B0CD0~1.EXE
      2⤵
      • Deletes itself
      PID:2716

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads