Analysis

  • max time kernel
    148s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24-01-2024 12:43

General

  • Target

    72454051b03c281f006cd3f8e88426b3.exe

  • Size

    673KB

  • MD5

    72454051b03c281f006cd3f8e88426b3

  • SHA1

    05bfa914bd7b1b64ffbf0bba9bd8ee78e17956b7

  • SHA256

    5998bc5d720691c9a28f1c3d2fafb55195be1a1afdda292064d9fb9aef9ae04b

  • SHA512

    d13cde9152191dacb811a81831a5106b2ccec49c6a366aabe4254f99d628f867bc4b64747c958dbdfe4321b70a811b2d46e21cd33925697fc5395d22920d7a46

  • SSDEEP

    12288:JMnBszy90Q7YX+CFTc5GDnbu/qmvSBjh+4nqjuwNhyiIgf96rNiBW:wszyUTmGf8Dv2VLqNNhyilYrNi

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 8 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 22 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72454051b03c281f006cd3f8e88426b3.exe
    "C:\Users\Admin\AppData\Local\Temp\72454051b03c281f006cd3f8e88426b3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1888
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Writes to the Master Boot Record (MBR)
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1812
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe
          4⤵
          • Adds policy Run key to start application
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2752
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\new.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\new.exe:*:Enabled:Windows Messanger" /f
            5⤵
              PID:2708
              • C:\Windows\SysWOW64\reg.exe
                REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\new.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\new.exe:*:Enabled:Windows Messanger" /f
                6⤵
                • Modifies firewall policy service
                • Modifies registry key
                PID:2040
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
              5⤵
                PID:2764
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                  6⤵
                  • Modifies firewall policy service
                  • Modifies registry key
                  PID:2648
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe:*:Enabled:Windows Messanger" /f
                5⤵
                  PID:2880
                  • C:\Windows\SysWOW64\reg.exe
                    REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe:*:Enabled:Windows Messanger" /f
                    6⤵
                    • Modifies firewall policy service
                    • Modifies registry key
                    PID:1724
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                  5⤵
                    PID:2732
                    • C:\Windows\SysWOW64\reg.exe
                      REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                      6⤵
                      • Modifies firewall policy service
                      • Modifies registry key
                      PID:2280
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe
              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe
              2⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of SetWindowsHookEx
              PID:2744
              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe
                C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Writes to the Master Boot Record (MBR)
                • Suspicious use of SetThreadContext
                • Suspicious use of SetWindowsHookEx
                PID:1300
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  PID:1616

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe

            Filesize

            1024KB

            MD5

            8b0075d01feddc0e208f8f2aae108b7f

            SHA1

            6053422705f97eaada22b36f18fce84d25b52122

            SHA256

            2f91707c2f568417938f4aea7783e4056f573675440af224e02c5961ad071832

            SHA512

            f476e00f2fae5fb4c9914b52ea6f54f58c9bd26d4e2c2ee97837e1be84498f73fd65293366dd3bd4f3b39425eec7a9826312d0347d2de96290467ab4a86e247c

          • memory/1300-95-0x0000000000400000-0x0000000000476000-memory.dmp

            Filesize

            472KB

          • memory/1300-83-0x0000000000400000-0x0000000000476000-memory.dmp

            Filesize

            472KB

          • memory/1616-104-0x0000000000400000-0x0000000000471000-memory.dmp

            Filesize

            452KB

          • memory/1812-55-0x0000000000400000-0x0000000000476000-memory.dmp

            Filesize

            472KB

          • memory/1812-15-0x0000000000400000-0x0000000000476000-memory.dmp

            Filesize

            472KB

          • memory/1812-17-0x0000000000400000-0x0000000000476000-memory.dmp

            Filesize

            472KB

          • memory/1812-13-0x0000000000400000-0x0000000000476000-memory.dmp

            Filesize

            472KB

          • memory/1812-26-0x0000000000400000-0x0000000000476000-memory.dmp

            Filesize

            472KB

          • memory/1812-23-0x0000000000400000-0x0000000000476000-memory.dmp

            Filesize

            472KB

          • memory/1812-21-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/1888-5-0x0000000000400000-0x0000000000500000-memory.dmp

            Filesize

            1024KB

          • memory/2752-39-0x0000000000400000-0x0000000000471000-memory.dmp

            Filesize

            452KB

          • memory/2752-48-0x0000000000400000-0x0000000000471000-memory.dmp

            Filesize

            452KB

          • memory/2752-44-0x0000000000400000-0x0000000000471000-memory.dmp

            Filesize

            452KB

          • memory/2752-42-0x0000000000400000-0x0000000000471000-memory.dmp

            Filesize

            452KB

          • memory/2752-106-0x0000000000400000-0x0000000000471000-memory.dmp

            Filesize

            452KB

          • memory/2752-107-0x0000000000400000-0x0000000000471000-memory.dmp

            Filesize

            452KB

          • memory/2752-109-0x0000000000400000-0x0000000000471000-memory.dmp

            Filesize

            452KB

          • memory/2752-110-0x0000000000400000-0x0000000000471000-memory.dmp

            Filesize

            452KB

          • memory/2752-111-0x0000000000400000-0x0000000000471000-memory.dmp

            Filesize

            452KB

          • memory/2752-114-0x0000000000400000-0x0000000000471000-memory.dmp

            Filesize

            452KB

          • memory/2752-115-0x0000000000400000-0x0000000000471000-memory.dmp

            Filesize

            452KB