Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 23:27
Static task
static1
Behavioral task
behavioral1
Sample
06e6778a2567421ebfbfe0e74510bab8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
06e6778a2567421ebfbfe0e74510bab8.exe
Resource
win10v2004-20231222-en
General
-
Target
06e6778a2567421ebfbfe0e74510bab8.exe
-
Size
143KB
-
MD5
06e6778a2567421ebfbfe0e74510bab8
-
SHA1
5b8def4e78d5a18a94626e02f4de3b78d550d147
-
SHA256
7163289819944f0a3a47a1f9b9b01830929402d89dcf64bb442ca5f769f90904
-
SHA512
0c0773a12e4c20f87728a8d20afb6c8357c5f5f5d1972293c3373a57681c7196f5b9b735802833c7b53feee848c9b693137ef4dc462863bfd1db2d580c8f65c9
-
SSDEEP
3072:68NHgLaV/AvT6lt1sQ4CDQv6vt/S9kGE7lud2iyI1Zeuu/H0Ygoh:68u2eT21sYDQvCqyGptZ6/HDh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2548 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2008 avp.exe -
Loads dropped DLL 1 IoCs
pid Process 2224 06e6778a2567421ebfbfe0e74510bab8.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 06e6778a2567421ebfbfe0e74510bab8.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\od3mdi.dll 06e6778a2567421ebfbfe0e74510bab8.exe File created C:\Windows\SysWOW64\delplme.bat 06e6778a2567421ebfbfe0e74510bab8.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\avp.exe 06e6778a2567421ebfbfe0e74510bab8.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 2224 06e6778a2567421ebfbfe0e74510bab8.exe 480 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2224 06e6778a2567421ebfbfe0e74510bab8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2548 2224 06e6778a2567421ebfbfe0e74510bab8.exe 29 PID 2224 wrote to memory of 2548 2224 06e6778a2567421ebfbfe0e74510bab8.exe 29 PID 2224 wrote to memory of 2548 2224 06e6778a2567421ebfbfe0e74510bab8.exe 29 PID 2224 wrote to memory of 2548 2224 06e6778a2567421ebfbfe0e74510bab8.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\06e6778a2567421ebfbfe0e74510bab8.exe"C:\Users\Admin\AppData\Local\Temp\06e6778a2567421ebfbfe0e74510bab8.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\cmd.execmd /c delplme.bat2⤵
- Deletes itself
PID:2548
-
-
C:\Windows\avp.exeC:\Windows\avp.exe1⤵
- Executes dropped EXE
PID:2008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD5b3e9aaa01c9dc4401dcfb5cc2c6c9f5f
SHA18cff0c17f2794428b8e3d8f68761633597207c03
SHA25674e43ac6fafc88f8e7b4aea9afcc86e5c2265e2fe4b1e33faf97e16bffde2ff2
SHA512ce4018c2a6911791e0d5eb2c387ce433c8c5a44d0e8a8714db834b52db7c1b5a2d2ef49f16484de26161f5f1e79fbc4a5af6ab5c554a9903230946904110c989
-
Filesize
22KB
MD5addfcb0cdc0704d0fb25cebf65e405d2
SHA1df1ef696de60ddc00a81a060e55845e786870787
SHA2567340510710f095f05b02fbb5253e023d6a138da6efd6d3cf016f19c278440d44
SHA51213928acc4df43e1ca18106acc16e32a06bfc51e4ca67f9da656432ead266636e3aaac98e4778d8d9d5af9aedca50b43f9b8e6fe20022e023d64b0860b66aae54
-
Filesize
245KB
MD529dba25d4a03a0b6abdd6a4f8c94a844
SHA1307d068001e969ae8cd787e8ff9f0767fde069a1
SHA256c4cae2a11d718bcbe8479b34cdd02d6d2176498e41816eccf7b4f2c118995626
SHA51295bf7fdf589aead88f67bf64d1720c6b4f4e7492030599461492d22e3c3ef7a9e6f9d922d784f3c6742f6809e46c82deab4053281f0374d741d54b10613ab363