Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 00:46

General

  • Target

    222c30e516c4ec626da5cc270e784be3.exe

  • Size

    462KB

  • MD5

    222c30e516c4ec626da5cc270e784be3

  • SHA1

    f5274d15cdb9e4121aea623eeb256fd0f7626ab5

  • SHA256

    9fe732aae839af5cd47d57a2b33f69dea2a5b1b8ec9ece543d784f0ad5eda1be

  • SHA512

    f3743f76ee74fb5db1ded1fb70242adb45295d6aec5f4d2e9de053e9d9c31aec06549391bdbf3d6baa45b7e9eeab28f20b15c656c98ea2b544bbcd516928d24a

  • SSDEEP

    6144:Iv49pz9cdrd77QUf9d9pTUEe3otMh4zzkY2h+lJmk3GbM98OtwEmEGInRXNl/OYR:GM6Jn1d9NQ3064PlTJ7L9QUn/luak8

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\222c30e516c4ec626da5cc270e784be3.exe
    "C:\Users\Admin\AppData\Local\Temp\222c30e516c4ec626da5cc270e784be3.exe"
    1⤵
    • Enumerates connected drives
    • Writes to the Master Boot Record (MBR)
    • Drops file in Program Files directory
    PID:2076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads