Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
22/11/2023, 08:18
Static task
static1
Behavioral task
behavioral1
Sample
b14f3597459b121dd8c5ba0cb561ef1f507012c656bce355963053023303c279.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
b14f3597459b121dd8c5ba0cb561ef1f507012c656bce355963053023303c279.exe
Resource
win10v2004-20231020-en
General
-
Target
b14f3597459b121dd8c5ba0cb561ef1f507012c656bce355963053023303c279.exe
-
Size
5.3MB
-
MD5
0f4f602bea755044616cef60b8cad504
-
SHA1
17bca6f1e8fe8b115262acc3cbfcbffe2fb112f4
-
SHA256
b14f3597459b121dd8c5ba0cb561ef1f507012c656bce355963053023303c279
-
SHA512
09b1a1e5aa78dbd67ff5d89324c8df873c5831bbeb6bd1158c3c146f5e86ff755451f63d08a7c07dd0ac9acbcf23e4aceee8a53b964fd00795f52ad9d52d3ffa
-
SSDEEP
98304:P+qCzZ9GSvkf+Gp9PGMhRiCu/CVUdVEy9qMBNP/qxct8qdvZOMA4bj:MzZ9tGe4UdVEy9qMBNLtNvZOMA4
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2024 b14f3597459b121dd8c5ba0cb561ef1f507012c656bce355963053023303c279.exe 2024 b14f3597459b121dd8c5ba0cb561ef1f507012c656bce355963053023303c279.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 b14f3597459b121dd8c5ba0cb561ef1f507012c656bce355963053023303c279.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2852 2024 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2852 2024 b14f3597459b121dd8c5ba0cb561ef1f507012c656bce355963053023303c279.exe 29 PID 2024 wrote to memory of 2852 2024 b14f3597459b121dd8c5ba0cb561ef1f507012c656bce355963053023303c279.exe 29 PID 2024 wrote to memory of 2852 2024 b14f3597459b121dd8c5ba0cb561ef1f507012c656bce355963053023303c279.exe 29 PID 2024 wrote to memory of 2852 2024 b14f3597459b121dd8c5ba0cb561ef1f507012c656bce355963053023303c279.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b14f3597459b121dd8c5ba0cb561ef1f507012c656bce355963053023303c279.exe"C:\Users\Admin\AppData\Local\Temp\b14f3597459b121dd8c5ba0cb561ef1f507012c656bce355963053023303c279.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 9122⤵
- Program crash
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5b434b1eff14158cb7708d70478b4f89a
SHA13e1411c5d7a5cffcf3c0b998cc7ea0b187c90ffb
SHA256e62f24419a4e9a511f95183a276b6eb27a685c64f37b9f2449ab993d33e9d708
SHA512303809947f45576cee4690fc90a85840d805bc42da2a0737f9f64d58b4ad5b170c5b3cbc89e3d12b1d7d0d554f87d22bb33644a64ad587d201d7fb47d43b0b75
-
Filesize
1.1MB
MD5f0fef6362d4886e85a186a5e3766650a
SHA165843b7052a4d1b84762479d79445c46834e18b5
SHA25615b9fe7d408cbf2204039087526e7df947df57b42ea479e303b682e956638816
SHA5123f6dfd701cf62b77219f8825a2257c4bd7d44ebafc5654b06abaf906ced2571f4eeb04fe22ae6136c14bddebddb12555aa6efd322e779443d57bb122ea786043