Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
12-11-2023 03:55
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231023-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20231020-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
1.4MB
-
MD5
c8ab62607200e5651d504b5a2df1b9db
-
SHA1
e3903f250f5db3cecea59640fddef71b990691a2
-
SHA256
3981bd1d992c04c8e5ef133aca900b3983493a2b97a8b7f11ad7c9f46f6b244a
-
SHA512
b488d515ad1e04da4a75f332bd4d4cce858d06c73f18f864d0d027d86bf66fc1c79b76bdc06abf2661435cf25ac9e8f3d41ed936ef97411f5d761a16a8ffe9ba
-
SSDEEP
24576:4qcNYC9gJLw2ioTa+sJPq1kbMRlZ1Nd6gznqbqScWR8oHz0Dx/lzVCzTNgo6NoZI:4qUYCL2ioTa+sakoRlZggzqeSXRNOzVj
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2968-0-0x0000000000400000-0x000000000079B000-memory.dmp upx behavioral1/memory/2968-17-0x0000000000400000-0x000000000079B000-memory.dmp upx behavioral1/memory/2968-20-0x0000000000400000-0x000000000079B000-memory.dmp upx behavioral1/memory/2968-21-0x0000000000400000-0x000000000079B000-memory.dmp upx behavioral1/memory/2968-22-0x0000000000400000-0x000000000079B000-memory.dmp upx behavioral1/memory/2968-23-0x0000000000400000-0x000000000079B000-memory.dmp upx behavioral1/memory/2968-26-0x0000000000400000-0x000000000079B000-memory.dmp upx behavioral1/memory/2968-27-0x0000000000400000-0x000000000079B000-memory.dmp upx behavioral1/memory/2968-28-0x0000000000400000-0x000000000079B000-memory.dmp upx behavioral1/memory/2968-29-0x0000000000400000-0x000000000079B000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 tmp.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Main tmp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2968 tmp.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2968 tmp.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2968 tmp.exe 2968 tmp.exe 2968 tmp.exe 2968 tmp.exe