Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 09:50

General

  • Target

    14f113459aabc3fee23e0bcb1cf1c335.exe

  • Size

    724KB

  • MD5

    14f113459aabc3fee23e0bcb1cf1c335

  • SHA1

    7475c02499946002da56d211201d70d4713252af

  • SHA256

    d2cbc1809acc0c0aaaef3461a813b00bf9b2bf71d5e103bc2b0e6538ba62eebd

  • SHA512

    a8abb34d9412bfacd7d096ca92feca5c1f6a61c5bb9ae0c01a20280163ecc6c4db94a02f8f7f76b147dd8e279ac8005a60cc48feecfba53e243dcabf46f98c5d

  • SSDEEP

    12288:ft9v5UZIvX41qVb0xxOSDjld1nBRXjIjb9875JK2:ft9O4wm0xxOOrBRzdJK2

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\14f113459aabc3fee23e0bcb1cf1c335.exe
    "C:\Users\Admin\AppData\Local\Temp\14f113459aabc3fee23e0bcb1cf1c335.exe"
    1⤵
    • Enumerates connected drives
    • Writes to the Master Boot Record (MBR)
    PID:2100

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2100-0-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB