Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 00:59
Static task
static1
Behavioral task
behavioral1
Sample
226a219536e4ec011d44e74650455e04.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
226a219536e4ec011d44e74650455e04.exe
Resource
win10v2004-20231215-en
General
-
Target
226a219536e4ec011d44e74650455e04.exe
-
Size
344KB
-
MD5
226a219536e4ec011d44e74650455e04
-
SHA1
4047a8bfe816fd684b0c5a03e3fe297ea253e592
-
SHA256
623683db1d6af3e783264c488e66c0536d0253976b255dbe488ffb99fca047e1
-
SHA512
509a000bfede46b559822613476d24333a99cfd92366cb1ebf0538525f0e6611c77d0bc917fc56962e2faff3fc0ff08897f022f1b4df3ce115dcff7b1bedb658
-
SSDEEP
6144:gQ0uize3ljwCPbp17u2Bc+zh2EgBu/YF098gWNlPTGQQm6agrd:gwVljnPP7ul+zFI5NtTird
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2680 4.exe 2592 VPort1.1.exe -
Loads dropped DLL 2 IoCs
pid Process 2020 226a219536e4ec011d44e74650455e04.exe 2020 226a219536e4ec011d44e74650455e04.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 226a219536e4ec011d44e74650455e04.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 226a219536e4ec011d44e74650455e04.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\VPort1.1.exe 4.exe File opened for modification C:\Windows\SysWOW64\VPort1.1.exe 4.exe File opened for modification C:\Windows\SysWOW64\VPort1.1.exe VPort1.1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2680 2020 226a219536e4ec011d44e74650455e04.exe 28 PID 2020 wrote to memory of 2680 2020 226a219536e4ec011d44e74650455e04.exe 28 PID 2020 wrote to memory of 2680 2020 226a219536e4ec011d44e74650455e04.exe 28 PID 2020 wrote to memory of 2680 2020 226a219536e4ec011d44e74650455e04.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\226a219536e4ec011d44e74650455e04.exe"C:\Users\Admin\AppData\Local\Temp\226a219536e4ec011d44e74650455e04.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2680
-
-
C:\Windows\SysWOW64\VPort1.1.exeC:\Windows\SysWOW64\VPort1.1.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD568a98913b6caf4c662fc84aa1023c524
SHA13afa43fd4a03d889e2b4873edd9e8c9a1a53d6d1
SHA25685ef3534bca5cedb2fbf822ff9e8d02dd9f26cd6508bfbbd12e873075867e7d2
SHA5121b5460ec4abf2131b2768ba8c8bc3b32858fa53fa5013306cd108526d8d1712052bbcec0a8da2bc15263c362a59c5390965ccf51781d64b8e3c70d12c8a69e19