Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/02/2024, 01:10

General

  • Target

    8b0075d01feddc0e208f8f2aae108b7f.exe

  • Size

    1024KB

  • MD5

    8b0075d01feddc0e208f8f2aae108b7f

  • SHA1

    6053422705f97eaada22b36f18fce84d25b52122

  • SHA256

    2f91707c2f568417938f4aea7783e4056f573675440af224e02c5961ad071832

  • SHA512

    f476e00f2fae5fb4c9914b52ea6f54f58c9bd26d4e2c2ee97837e1be84498f73fd65293366dd3bd4f3b39425eec7a9826312d0347d2de96290467ab4a86e247c

  • SSDEEP

    12288:sQPPBj7OeDKBl2GDnvuKfmkSBjhMvnaPuwjhyiigf96Zy62B:sQJ7OeDEsGr3+k2V0CNjhyi3YZ72

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 10 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b0075d01feddc0e208f8f2aae108b7f.exe
    "C:\Users\Admin\AppData\Local\Temp\8b0075d01feddc0e208f8f2aae108b7f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:324
    • C:\Users\Admin\AppData\Local\Temp\8b0075d01feddc0e208f8f2aae108b7f.exe
      "C:\Users\Admin\AppData\Local\Temp\8b0075d01feddc0e208f8f2aae108b7f.exe"
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1804
      • C:\Users\Admin\AppData\Local\Temp\8b0075d01feddc0e208f8f2aae108b7f.exe
        "C:\Users\Admin\AppData\Local\Temp\8b0075d01feddc0e208f8f2aae108b7f.exe"
        3⤵
        • Adds policy Run key to start application
        • Modifies Installed Components in the registry
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2908
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4612
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:2560
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\new.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\new.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4868
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\new.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\new.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:1012
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4260
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:2216
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\8b0075d01feddc0e208f8f2aae108b7f.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\8b0075d01feddc0e208f8f2aae108b7f.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3080
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\8b0075d01feddc0e208f8f2aae108b7f.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\8b0075d01feddc0e208f8f2aae108b7f.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:3048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/324-0-0x0000000000400000-0x0000000000500000-memory.dmp

    Filesize

    1024KB

  • memory/1804-14-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/1804-3-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/1804-5-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2908-26-0x0000000075C50000-0x0000000075D40000-memory.dmp

    Filesize

    960KB

  • memory/2908-35-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2908-13-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2908-19-0x0000000075C50000-0x0000000075D40000-memory.dmp

    Filesize

    960KB

  • memory/2908-21-0x0000000077C86000-0x0000000077C87000-memory.dmp

    Filesize

    4KB

  • memory/2908-20-0x0000000077A00000-0x0000000077A7A000-memory.dmp

    Filesize

    488KB

  • memory/2908-22-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2908-25-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2908-8-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2908-30-0x0000000077A00000-0x0000000077A7A000-memory.dmp

    Filesize

    488KB

  • memory/2908-32-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2908-10-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2908-38-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2908-42-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2908-45-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2908-48-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2908-52-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2908-55-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2908-58-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2908-62-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2908-65-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB

  • memory/2908-68-0x0000000000400000-0x0000000000471000-memory.dmp

    Filesize

    452KB