Analysis

  • max time kernel
    147s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    03-02-2024 01:10

General

  • Target

    8b0075d01feddc0e208f8f2aae108b7f.exe

  • Size

    1024KB

  • MD5

    8b0075d01feddc0e208f8f2aae108b7f

  • SHA1

    6053422705f97eaada22b36f18fce84d25b52122

  • SHA256

    2f91707c2f568417938f4aea7783e4056f573675440af224e02c5961ad071832

  • SHA512

    f476e00f2fae5fb4c9914b52ea6f54f58c9bd26d4e2c2ee97837e1be84498f73fd65293366dd3bd4f3b39425eec7a9826312d0347d2de96290467ab4a86e247c

  • SSDEEP

    12288:sQPPBj7OeDKBl2GDnvuKfmkSBjhMvnaPuwjhyiigf96Zy62B:sQJ7OeDEsGr3+k2V0CNjhyi3YZ72

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 8 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b0075d01feddc0e208f8f2aae108b7f.exe
    "C:\Users\Admin\AppData\Local\Temp\8b0075d01feddc0e208f8f2aae108b7f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Users\Admin\AppData\Local\Temp\8b0075d01feddc0e208f8f2aae108b7f.exe
      "C:\Users\Admin\AppData\Local\Temp\8b0075d01feddc0e208f8f2aae108b7f.exe"
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2220
      • C:\Users\Admin\AppData\Local\Temp\8b0075d01feddc0e208f8f2aae108b7f.exe
        "C:\Users\Admin\AppData\Local\Temp\8b0075d01feddc0e208f8f2aae108b7f.exe"
        3⤵
        • Adds policy Run key to start application
        • Modifies Installed Components in the registry
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2388
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\new.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\new.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2612
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2892
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\8b0075d01feddc0e208f8f2aae108b7f.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\8b0075d01feddc0e208f8f2aae108b7f.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2744
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2660
  • C:\Windows\SysWOW64\reg.exe
    REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\new.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\new.exe:*:Enabled:Windows Messanger" /f
    1⤵
    • Modifies firewall policy service
    • Modifies registry key
    PID:2784
  • C:\Windows\SysWOW64\reg.exe
    REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
    1⤵
    • Modifies firewall policy service
    • Modifies registry key
    PID:2480
  • C:\Windows\SysWOW64\reg.exe
    REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\8b0075d01feddc0e208f8f2aae108b7f.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\8b0075d01feddc0e208f8f2aae108b7f.exe:*:Enabled:Windows Messanger" /f
    1⤵
    • Modifies firewall policy service
    • Modifies registry key
    PID:2840
  • C:\Windows\SysWOW64\reg.exe
    REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
    1⤵
    • Modifies firewall policy service
    • Modifies registry key
    PID:2492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2196-0-0x0000000000400000-0x0000000000500000-memory.dmp

    Filesize

    1024KB

  • memory/2220-13-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2220-3-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2220-5-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2220-21-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2220-7-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2220-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2220-15-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2220-28-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2388-39-0x0000000074F00000-0x0000000074FA0000-memory.dmp

    Filesize

    640KB

  • memory/2388-45-0x0000000074F00000-0x0000000074FA0000-memory.dmp

    Filesize

    640KB

  • memory/2388-27-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2388-18-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2388-40-0x0000000077261000-0x0000000077262000-memory.dmp

    Filesize

    4KB

  • memory/2388-20-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2388-38-0x0000000076830000-0x0000000076940000-memory.dmp

    Filesize

    1.1MB

  • memory/2388-23-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2388-41-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2388-42-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2388-43-0x0000000076830000-0x0000000076940000-memory.dmp

    Filesize

    1.1MB

  • memory/2388-34-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2388-47-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2388-48-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2388-49-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2388-51-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2388-52-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2388-53-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2388-55-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2388-57-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2388-60-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2388-61-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB