Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 03:08
Static task
static1
Behavioral task
behavioral1
Sample
0c84b0f75aa2bdd54039a26223d2ae7e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c84b0f75aa2bdd54039a26223d2ae7e.exe
Resource
win10v2004-20231222-en
General
-
Target
0c84b0f75aa2bdd54039a26223d2ae7e.exe
-
Size
137KB
-
MD5
0c84b0f75aa2bdd54039a26223d2ae7e
-
SHA1
d2a937d0ee8a02fe4d8ce4a1b9e43b0976feacc3
-
SHA256
dd61e007932dbe98ea99aa5c0b22852dd3d37e8f468a4b1f1b79786b72cd5aeb
-
SHA512
474c806ecc16c91000162c0ce0a966b1cbfcbf267149f711f4a26b65393059d35f6a1417554896bd1386e5459772a0fe648e0d6958e953e750a0efa3dbd11d1b
-
SSDEEP
3072:stirCYH2PFQvbOKe1aRCaRbbrMbvT0q8O1cZPzQ7IXMBc+AMP+QfQEhxFyVU76vB:OLYH2PGyKeQsa5wvP6bQ7yMP+DE8276p
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 324 cmd.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 0c84b0f75aa2bdd54039a26223d2ae7e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 0c84b0f75aa2bdd54039a26223d2ae7e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ 0c84b0f75aa2bdd54039a26223d2ae7e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 0c84b0f75aa2bdd54039a26223d2ae7e.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{F9BA1AA9-CAD4-4C14-BDE6-922DFF5F6F38} 0c84b0f75aa2bdd54039a26223d2ae7e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F9BA1AA9-CAD4-4C14-BDE6-922DFF5F6F38}\dlloadtime = "1703960047" 0c84b0f75aa2bdd54039a26223d2ae7e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F9BA1AA9-CAD4-4C14-BDE6-922DFF5F6F38}\mac = "6E-55-6A-B5-2A-45" 0c84b0f75aa2bdd54039a26223d2ae7e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F9BA1AA9-CAD4-4C14-BDE6-922DFF5F6F38}\dlt = "1703960047" 0c84b0f75aa2bdd54039a26223d2ae7e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1996 wrote to memory of 324 1996 0c84b0f75aa2bdd54039a26223d2ae7e.exe 28 PID 1996 wrote to memory of 324 1996 0c84b0f75aa2bdd54039a26223d2ae7e.exe 28 PID 1996 wrote to memory of 324 1996 0c84b0f75aa2bdd54039a26223d2ae7e.exe 28 PID 1996 wrote to memory of 324 1996 0c84b0f75aa2bdd54039a26223d2ae7e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c84b0f75aa2bdd54039a26223d2ae7e.exe"C:\Users\Admin\AppData\Local\Temp\0c84b0f75aa2bdd54039a26223d2ae7e.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\0C84B0~1.EXE >> NUL2⤵
- Deletes itself
PID:324
-