Analysis

  • max time kernel
    85s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/02/2024, 12:15

General

  • Target

    8f20eb7e5e0b351ae835e4359f7247c7.exe

  • Size

    341KB

  • MD5

    8f20eb7e5e0b351ae835e4359f7247c7

  • SHA1

    48ed86b2a5c40fa6892b0b5bb753d0f23209536d

  • SHA256

    134244a67238db9e987e0169e75c6d2fc55e0de32f19a8ee72cf6e00086d29b7

  • SHA512

    525d8e57f1781d93c61dcf78d303ff31b241b1de6ffc316cca2d8e0652fd3dddf938460ca385087d0ba3e3c2fa0f403616edbbf305ba9d2221cb25d41dab59ba

  • SSDEEP

    6144:6fZ/nwzIhoZib9i0ju9BKVoEZUW0I7PlavVE9M7MjIPSSLJp3A:6fpPOZiBiq3zxD7+V66A

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Modifies system certificate store 2 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f20eb7e5e0b351ae835e4359f7247c7.exe
    "C:\Users\Admin\AppData\Local\Temp\8f20eb7e5e0b351ae835e4359f7247c7.exe"
    1⤵
    • Enumerates connected drives
    • Writes to the Master Boot Record (MBR)
    • Modifies system certificate store
    PID:2184

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2184-0-0x0000000000400000-0x00000000004BF000-memory.dmp

          Filesize

          764KB

        • memory/2184-6-0x0000000000400000-0x00000000004BF000-memory.dmp

          Filesize

          764KB