Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08-01-2024 17:29
Static task
static1
Behavioral task
behavioral1
Sample
4c0a7ca04aac0a5abb6a0ae0d59d7a0d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4c0a7ca04aac0a5abb6a0ae0d59d7a0d.exe
Resource
win10v2004-20231215-en
General
-
Target
4c0a7ca04aac0a5abb6a0ae0d59d7a0d.exe
-
Size
250KB
-
MD5
4c0a7ca04aac0a5abb6a0ae0d59d7a0d
-
SHA1
1bb69e84abfd74269e9785f5b679c30467532a14
-
SHA256
72d779a0485360b5a636bc014d5ccf88ff4745453382ac675b968d5301f9b418
-
SHA512
aa5cc1743d5443609c8b749d45066ca06193164d87bd4672eee720d097d99716d9acff4854f413dfe32c6fe7a681da25d131c546f9186592f7b327e45ded835e
-
SSDEEP
6144:j7y+Qfb56BBMl5yyw5CpA/7sJ5pwvP6bQ7yMP+DE827KJF:/yf6aw5krJ5i6b7MP+Dd2A
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 4c0a7ca04aac0a5abb6a0ae0d59d7a0d.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\inf\ram32xp.dll 4c0a7ca04aac0a5abb6a0ae0d59d7a0d.exe File created C:\Windows\inf\ram65xp.dll 4c0a7ca04aac0a5abb6a0ae0d59d7a0d.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 4c0a7ca04aac0a5abb6a0ae0d59d7a0d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ 4c0a7ca04aac0a5abb6a0ae0d59d7a0d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 4c0a7ca04aac0a5abb6a0ae0d59d7a0d.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2848 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2848 AcroRd32.exe 2848 AcroRd32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2788 2656 4c0a7ca04aac0a5abb6a0ae0d59d7a0d.exe 28 PID 2656 wrote to memory of 2788 2656 4c0a7ca04aac0a5abb6a0ae0d59d7a0d.exe 28 PID 2656 wrote to memory of 2788 2656 4c0a7ca04aac0a5abb6a0ae0d59d7a0d.exe 28 PID 2656 wrote to memory of 2788 2656 4c0a7ca04aac0a5abb6a0ae0d59d7a0d.exe 28 PID 2656 wrote to memory of 2788 2656 4c0a7ca04aac0a5abb6a0ae0d59d7a0d.exe 28 PID 2656 wrote to memory of 2788 2656 4c0a7ca04aac0a5abb6a0ae0d59d7a0d.exe 28 PID 2656 wrote to memory of 2788 2656 4c0a7ca04aac0a5abb6a0ae0d59d7a0d.exe 28 PID 2720 wrote to memory of 2848 2720 explorer.exe 30 PID 2720 wrote to memory of 2848 2720 explorer.exe 30 PID 2720 wrote to memory of 2848 2720 explorer.exe 30 PID 2720 wrote to memory of 2848 2720 explorer.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c0a7ca04aac0a5abb6a0ae0d59d7a0d.exe"C:\Users\Admin\AppData\Local\Temp\4c0a7ca04aac0a5abb6a0ae0d59d7a0d.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe "c:\FINAL_TBF2.pdf"2⤵PID:2788
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\FINAL_TBF2.pdf"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5490106480af6d2961fa98654dec9d6c5
SHA13da91a7d02a8404cee66fbd941784912fbab177b
SHA2569ca2f80aa258410ecee593951b18f38d155efd4b4731bf989f64fb97461838eb
SHA512ae053d0476b1a89d4fd70d1272e7a77980a8645530c874e48d8163e3bdb95365ad8a170bc4d00983a45c17c956f086e7f39fff0d67f79c97697708395f4e4138