Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/01/2024, 09:44

General

  • Target

    SecuriteInfo.com.Win32.TrojanX-gen.12542.exe

  • Size

    590KB

  • MD5

    f08e702a47af088a494a1954c721e44c

  • SHA1

    b9055d98e275ac990b0d2e269f6b4e1eb79847c2

  • SHA256

    e36a724b91f0413fe07aed3c572a9084ba14811d339e8d312432bf11258926b9

  • SHA512

    48f3a5403b3b76089e8bd82b3986d758f3cf70103b69510d20f24ae56e4b5025e089de4f6e06207bd09213e4ef543beca68d9ca2afeea8d620f01efff857038b

  • SSDEEP

    12288:Ni/dmN0+vr3lloV0PArCRgfR8nh1Ry13dz4HfujotZg4Ea:g/ENbvrVJArCRgfeh3cz4Hbu4

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.12542.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.12542.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    PID:1196
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:2508
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2488

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1196-1-0x00000000006C0000-0x00000000007C0000-memory.dmp

      Filesize

      1024KB

    • memory/1196-2-0x00000000021E0000-0x000000000224B000-memory.dmp

      Filesize

      428KB

    • memory/1196-3-0x0000000000400000-0x0000000000499000-memory.dmp

      Filesize

      612KB

    • memory/1196-4-0x0000000000400000-0x0000000000499000-memory.dmp

      Filesize

      612KB

    • memory/1196-5-0x0000000000400000-0x0000000000499000-memory.dmp

      Filesize

      612KB

    • memory/1196-6-0x00000000006C0000-0x00000000007C0000-memory.dmp

      Filesize

      1024KB

    • memory/1196-8-0x00000000021E0000-0x000000000224B000-memory.dmp

      Filesize

      428KB

    • memory/2488-20-0x00000159D6C40000-0x00000159D6C50000-memory.dmp

      Filesize

      64KB

    • memory/2488-36-0x00000159D6D40000-0x00000159D6D50000-memory.dmp

      Filesize

      64KB

    • memory/2488-52-0x00000159DF090000-0x00000159DF091000-memory.dmp

      Filesize

      4KB

    • memory/2488-54-0x00000159DF0C0000-0x00000159DF0C1000-memory.dmp

      Filesize

      4KB

    • memory/2488-55-0x00000159DF0C0000-0x00000159DF0C1000-memory.dmp

      Filesize

      4KB

    • memory/2488-56-0x00000159DF1D0000-0x00000159DF1D1000-memory.dmp

      Filesize

      4KB