Analysis

  • max time kernel
    9s
  • max time network
    4s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    14/01/2024, 01:18

Errors

Reason
Machine shutdown

General

  • Target

    59e5bbf171a43f714b392b3ab0a8bc34.exe

  • Size

    498KB

  • MD5

    59e5bbf171a43f714b392b3ab0a8bc34

  • SHA1

    b5d902912bbbf81a1ef882e5ce6cc5003f96bbff

  • SHA256

    ea18828c0e85e693d40a12236ff340e3e48aa0bf0494af5ac4fe9619ba05049b

  • SHA512

    01d815ebb40508e75e08387741863785835af656630850b794e1f15b8b90a57d7ec2c01e3f270765c3afda689968869b605827f2a3e60cc30197f19584516af1

  • SSDEEP

    12288:SEdzKV2l8+gv73mxub7+CPAI2OBxOZTN/aWOyVZL:SEd2Ilr94+yAIlS

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59e5bbf171a43f714b392b3ab0a8bc34.exe
    "C:\Users\Admin\AppData\Local\Temp\59e5bbf171a43f714b392b3ab0a8bc34.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of AdjustPrivilegeToken
    PID:2432

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2432-1-0x0000000002DB0000-0x0000000002EB0000-memory.dmp

          Filesize

          1024KB

        • memory/2432-2-0x0000000000320000-0x000000000038B000-memory.dmp

          Filesize

          428KB

        • memory/2432-4-0x0000000000400000-0x0000000002D0B000-memory.dmp

          Filesize

          41.0MB

        • memory/2432-3-0x0000000000400000-0x0000000002D0B000-memory.dmp

          Filesize

          41.0MB