Analysis

  • max time kernel
    150s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 13:22

General

  • Target

    37d5f665081bf379ad8f0d3bcfc9e635.exe

  • Size

    210KB

  • MD5

    37d5f665081bf379ad8f0d3bcfc9e635

  • SHA1

    bd8691e774a4d19887edc7b90095fdd4be13b974

  • SHA256

    447a5eb1795278d379b93a14934ed6d27dd931518aacb597e1534eabec5fda17

  • SHA512

    993dd2f1f3db22b1ef9fb4440be306bc4efe66594dbc61d425ac3d90dcc16805c58262f97adc9931308c69da2436dfc3bf5cc64994c0c95331753b57ac43849c

  • SSDEEP

    3072:J7phzIFu2mciZ4u9Cpb6vIYytbjweflu3VNRzW/wrF9s+Nz9OyD93cHStH7lY385:JtdI+cie4C2vIdZIdk+NB7T7lxtVV

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37d5f665081bf379ad8f0d3bcfc9e635.exe
    "C:\Users\Admin\AppData\Local\Temp\37d5f665081bf379ad8f0d3bcfc9e635.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of SetThreadContext
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\Users\Admin\AppData\Local\Temp\37d5f665081bf379ad8f0d3bcfc9e635.exe
      "C:\Users\Admin\AppData\Local\Temp\37d5f665081bf379ad8f0d3bcfc9e635.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        "C:\Users\Admin\AppData\Roaming\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Writes to the Master Boot Record (MBR)
        • Suspicious use of SetThreadContext
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3024
        • C:\Users\Admin\AppData\Roaming\svchost.exe
          "C:\Users\Admin\AppData\Roaming\svchost.exe"
          4⤵
          • Modifies firewall policy service
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    210KB

    MD5

    37d5f665081bf379ad8f0d3bcfc9e635

    SHA1

    bd8691e774a4d19887edc7b90095fdd4be13b974

    SHA256

    447a5eb1795278d379b93a14934ed6d27dd931518aacb597e1534eabec5fda17

    SHA512

    993dd2f1f3db22b1ef9fb4440be306bc4efe66594dbc61d425ac3d90dcc16805c58262f97adc9931308c69da2436dfc3bf5cc64994c0c95331753b57ac43849c

  • C:\Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    128KB

    MD5

    fff8dc998d49cf947c4b390f99202d16

    SHA1

    82c9a9d4ce3ebefed1ccfa3d82750e196f1341c0

    SHA256

    438eb4764c395e03c44563ae9cbeaad06ffe07fe6c898d17a5bb02608b92ef63

    SHA512

    042432f6d9b6bd1c53a756a53f6ffa7ffb5aef5f9a560bfda968b689fdd379139d4573d0f310a797056df53546304a53176670c0bfa4fb03c3c0563e266f0c1e

  • C:\Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    45KB

    MD5

    c69e9c397dc425e2c7e96087bb3a8c09

    SHA1

    79ed4c067019ce9627d56c1d5e1d3ab7c73fd6d7

    SHA256

    9f0974cf66dcc7426ee3a85a54cdbb2faecc7e510a0c5410b58b26be78ce387b

    SHA512

    9df03d9f73714e6c6d4c08d68c19aa0477c152fcec17ca1e0a3e4b3a49267451079c2065a2c6a3bd9ed5c70f92a555ef6f447f7607276508e6ed5d175de53164

  • \Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    182KB

    MD5

    709faa4a1ef5b3b807e78b16690a165b

    SHA1

    9be41f7c8c15814ab8853fd1d9b23525a8d151ad

    SHA256

    e3678462253e9759abd4165464c747aa15233b78e99425d7f6447f2d5bd8de00

    SHA512

    d2dd30d3c150d2ecd8453bde043cad700c5ff1a210b1309f52d716c76c5f9c047500aa022f11ea4d6959db10e6de0d5689d751415b6ba3564f57b2d0e0c13013

  • memory/2276-26-0x0000000000400000-0x0000000000481029-memory.dmp

    Filesize

    516KB

  • memory/2276-21-0x00000000004A0000-0x00000000004A1000-memory.dmp

    Filesize

    4KB

  • memory/2276-20-0x00000000004B0000-0x00000000004B1000-memory.dmp

    Filesize

    4KB

  • memory/2276-19-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2276-18-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2276-17-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/2276-16-0x0000000000240000-0x0000000000250000-memory.dmp

    Filesize

    64KB

  • memory/2276-15-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB

  • memory/2276-14-0x00000000004C0000-0x00000000004C1000-memory.dmp

    Filesize

    4KB

  • memory/2276-13-0x00000000004C0000-0x00000000004C1000-memory.dmp

    Filesize

    4KB

  • memory/2276-11-0x00000000004C0000-0x00000000004C1000-memory.dmp

    Filesize

    4KB

  • memory/2276-9-0x00000000004C0000-0x00000000004C1000-memory.dmp

    Filesize

    4KB

  • memory/2276-8-0x00000000004C0000-0x00000000004C1000-memory.dmp

    Filesize

    4KB

  • memory/2276-5-0x00000000004C0000-0x00000000004C1000-memory.dmp

    Filesize

    4KB

  • memory/2276-3-0x00000000004C0000-0x00000000004C1000-memory.dmp

    Filesize

    4KB

  • memory/2276-2-0x00000000003D0000-0x00000000003D2000-memory.dmp

    Filesize

    8KB

  • memory/2276-22-0x0000000000490000-0x0000000000491000-memory.dmp

    Filesize

    4KB

  • memory/2276-1-0x0000000000400000-0x0000000000481029-memory.dmp

    Filesize

    516KB

  • memory/2276-6-0x00000000004C0000-0x00000000004C1000-memory.dmp

    Filesize

    4KB

  • memory/2276-10-0x00000000004C0000-0x00000000004C1000-memory.dmp

    Filesize

    4KB

  • memory/2276-0-0x0000000000400000-0x0000000000481029-memory.dmp

    Filesize

    516KB

  • memory/2276-7-0x00000000004C0000-0x00000000004C1000-memory.dmp

    Filesize

    4KB

  • memory/2656-64-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2656-57-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2656-62-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2656-69-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2656-68-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2656-67-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2656-58-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2656-65-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2656-59-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2656-63-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2656-66-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2656-61-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2656-60-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2820-27-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2820-25-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2820-23-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3024-38-0x0000000000400000-0x0000000000481029-memory.dmp

    Filesize

    516KB

  • memory/3024-45-0x00000000024B0000-0x00000000024B1000-memory.dmp

    Filesize

    4KB

  • memory/3024-47-0x00000000024A0000-0x00000000024A1000-memory.dmp

    Filesize

    4KB

  • memory/3024-43-0x0000000002480000-0x0000000002481000-memory.dmp

    Filesize

    4KB

  • memory/3024-46-0x0000000002490000-0x0000000002491000-memory.dmp

    Filesize

    4KB

  • memory/3024-51-0x0000000000400000-0x0000000000481029-memory.dmp

    Filesize

    516KB

  • memory/3024-42-0x00000000001D0000-0x00000000001E0000-memory.dmp

    Filesize

    64KB

  • memory/3024-37-0x0000000000400000-0x0000000000481029-memory.dmp

    Filesize

    516KB