Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2024, 17:01

General

  • Target

    5415e23892d2d009bf0f427337968448.exe

  • Size

    329KB

  • MD5

    5415e23892d2d009bf0f427337968448

  • SHA1

    134a495a64a0e72776789ca4c7daa00dbe8b8eaf

  • SHA256

    25eb9e2f13d2f8cfabd7366ae5c598ffd4cb86e1a3b00f0357cb67364f1b5f02

  • SHA512

    66403d91fdf9cae237b1e9a24b889134eb10112652443abf9ecfde05500b09174c8f78d0223ad3e6f16d8753a23bf716ab9bfa62d4d88f94f8f8e8b18f058ac2

  • SSDEEP

    6144:fePJYhcvhLxotp++sCTHUIKz3JWGYBjWo8XTDNl4KqRqml+RoqKG7e/z:fePJYIh9of++skOYBjDoDNlaRqmuDmz

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5415e23892d2d009bf0f427337968448.exe
    "C:\Users\Admin\AppData\Local\Temp\5415e23892d2d009bf0f427337968448.exe"
    1⤵
    • Enumerates connected drives
    • Writes to the Master Boot Record (MBR)
    • Drops file in Program Files directory
    • Modifies system certificate store
    PID:860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab4AB8.tmp

    Filesize

    7KB

    MD5

    fe5c4c96a7616471e3b8d48eb9e25b06

    SHA1

    ec3a36dc343664add1cc4e5c239fe2397fcfc989

    SHA256

    c57dd23b99e7c3b613e78264f9dddbd876ea27b1a8edaee385ec43c05cc4d974

    SHA512

    dfadf927599083d22e34205437f332aea5ac7d9aace4c02bef98d3ff650e270c3e2abc4043d56d337df56c08adb4e4b38e00dfdfa90bf44d22d921f3d6889e3b

  • C:\Users\Admin\AppData\Local\Temp\Tar4AEA.tmp

    Filesize

    16KB

    MD5

    4bdfab600d4a330bf243ddd202d68f8f

    SHA1

    3cf3288feba422c80337a43387e67453a74b29f3

    SHA256

    1ed8beefc13fe887b5b4e7cd00dbfa66fb84a46f351c3b575b61ccc158bf4cd0

    SHA512

    221c29cb50fd9fc9334c2e220f493767b16910fbb802cedf91a87e6c1e0bb1916089a166c90f120881f3f00d397159a38a3b5e4f7e657d0355314fc05c347a5a

  • memory/860-0-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/860-61-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/860-67-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB