Analysis

  • max time kernel
    143s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/03/2024, 13:18

General

  • Target

    beb4479c7ca079bcfd383c866dabcd97.exe

  • Size

    136KB

  • MD5

    beb4479c7ca079bcfd383c866dabcd97

  • SHA1

    3f936a598933295519e5cca4a1c6f270ea61ec79

  • SHA256

    7a75e1ccffbb48b833a6c0568d312282857e397024fcf134870914831e11b21f

  • SHA512

    6ee3b17c0321e90b48e1ab935c77f419d7646a47394ecb74d18cb94a45230629e0ea0cb413b97aa52c579c8a70697f514af6662b10df140eeeef2c6ed892505a

  • SSDEEP

    3072:Lj51Phc8CVrFRsEOIVC1bPw3l4/VVlW0iqf2Tf4SHSle:Lj5M8CVpRs6C1Dw3WNVlW0iqwf4SHSl

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\beb4479c7ca079bcfd383c866dabcd97.exe
    "C:\Users\Admin\AppData\Local\Temp\beb4479c7ca079bcfd383c866dabcd97.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: LoadsDriver
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c delplme.bat
      2⤵
      • Deletes itself
      PID:1500
  • C:\Windows\avp.exe
    C:\Windows\avp.exe
    1⤵
    • Executes dropped EXE
    PID:2980

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\delplme.bat

          Filesize

          264B

          MD5

          ff0cfc884b10bd269cad65416147445f

          SHA1

          c25074b014db786161c8502a333b1ab1088db6c8

          SHA256

          adf0cda2997ba8739eb5b5205fc56f0072006634a9096f6942e8df22f27f4dd0

          SHA512

          221f90e31cbc739c1c9858cf95346c76d25bbc5dd7cad29dd2146ddc30f72fa6696c3bd5d6e4d872ee21183f1e14317ce07b3e02835e920e36adec181a99e458

        • C:\Windows\avp.exe

          Filesize

          18KB

          MD5

          b1772ac0ea52843391e6242b403e4979

          SHA1

          50673dfe4a0a7847f3fb37681cf94670b3d2b72f

          SHA256

          02ee17746e5aa2813bc50b3e59f3a86798015d023d0397d4cfe974b317445e8a

          SHA512

          17a3e9ce45b8d2af30e0af28747ea9fd9b72b594bf7c9fb4e09398beeae2eb9e6cd7ecf39f9230aa5e813c1a677783d0f9f88f9235ac7039db66538c2e1d10fb

        • \Windows\SysWOW64\od3mdi.dll

          Filesize

          103KB

          MD5

          aadb4ba1cbf92d6f8f232b19d66359ba

          SHA1

          be7c64a9395e8f26b35b3d2061e4a1cfa126f1e2

          SHA256

          bbf8f4242396712cfe980755c7e1640e5a572356ad8e4ce94f22c72504aa3ea1

          SHA512

          4a2e8080e60b27569cc97023617af5b75b2d46a940bd1e4462c3532aa3dfae630c56570faea83da2a7456388b3d75c37bec869f6013e0cfefc840747da43eb83

        • memory/2328-0-0x0000000000400000-0x0000000000454200-memory.dmp

          Filesize

          336KB

        • memory/2328-1-0x00000000001B0000-0x00000000001B1000-memory.dmp

          Filesize

          4KB

        • memory/2328-2-0x0000000000400000-0x0000000000454200-memory.dmp

          Filesize

          336KB

        • memory/2328-15-0x0000000000400000-0x0000000000454200-memory.dmp

          Filesize

          336KB

        • memory/2980-20-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/2980-18-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/2980-19-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/2980-17-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/2980-21-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/2980-22-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/2980-23-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/2980-24-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/2980-25-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/2980-27-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/2980-28-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/2980-29-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/2980-30-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB