Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 02:54
Static task
static1
Behavioral task
behavioral1
Sample
DigitalSignCheck.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
DigitalSignCheck.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
安装说明.url
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
安装说明.url
Resource
win10v2004-20231215-en
General
-
Target
DigitalSignCheck.exe
-
Size
283KB
-
MD5
7706d2553bdd172f37f84d80eda9d280
-
SHA1
6c8345339601d05c9146e686422cfc3255a8ecd8
-
SHA256
948755ae43815b0dba243df3b603ac52033154d024329c38a4306243494ca20a
-
SHA512
e2941012fa4ce079d618d18a0fbae39fe19b70ced255667f11141cb87629aaa3bee53f402d652fde7c2b679ffd726b64bc97bb65ffe21f9d6cd08f67c194c1fd
-
SSDEEP
6144:psHAbjkAhKUs3W3E+nsn9QJKw1wvP6bQ7yMP+DE827i:psHAcQPsnuJKZ6b7MP+Dd2e
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 DigitalSignCheck.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key DigitalSignCheck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ DigitalSignCheck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" DigitalSignCheck.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1328 DigitalSignCheck.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1328 DigitalSignCheck.exe 1328 DigitalSignCheck.exe