Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 10:13
Static task
static1
Behavioral task
behavioral1
Sample
7373997c5b9ad4ba98a59bd95f8e1bc82baa3e804ca26de99b7e3bac7a7b75fd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7373997c5b9ad4ba98a59bd95f8e1bc82baa3e804ca26de99b7e3bac7a7b75fd.exe
Resource
win10v2004-20240226-en
General
-
Target
7373997c5b9ad4ba98a59bd95f8e1bc82baa3e804ca26de99b7e3bac7a7b75fd.exe
-
Size
1.5MB
-
MD5
43a218b70237c795a6f92aceb5cd4c6e
-
SHA1
575236af9a56a4eb69e473f6f5ebc85508f0257b
-
SHA256
7373997c5b9ad4ba98a59bd95f8e1bc82baa3e804ca26de99b7e3bac7a7b75fd
-
SHA512
d631a6006b295cab98a4df75fab753ed4ad744966ed99f8e55cb05c0bae4ed1e7cd9050408648248e77628b27368a6b96206905b66a1e5a5801f7d84c0e2cc23
-
SSDEEP
24576:/sqiKUgGtZeTq/SI0w9u/24PHfZVt+xd3vopBcef8N7SF/4ErHBkBcM2lE4ZEbLi:0WA9Na3Zfo7RErhplEmbTki
Malware Config
Signatures
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini 7373997c5b9ad4ba98a59bd95f8e1bc82baa3e804ca26de99b7e3bac7a7b75fd.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 7373997c5b9ad4ba98a59bd95f8e1bc82baa3e804ca26de99b7e3bac7a7b75fd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION 7373997c5b9ad4ba98a59bd95f8e1bc82baa3e804ca26de99b7e3bac7a7b75fd.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main 7373997c5b9ad4ba98a59bd95f8e1bc82baa3e804ca26de99b7e3bac7a7b75fd.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl 7373997c5b9ad4ba98a59bd95f8e1bc82baa3e804ca26de99b7e3bac7a7b75fd.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\7373997c5b9ad4ba98a59bd95f8e1bc82baa3e804ca26de99b7e3bac7a7b75fd.exe = "11000" 7373997c5b9ad4ba98a59bd95f8e1bc82baa3e804ca26de99b7e3bac7a7b75fd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1784 7373997c5b9ad4ba98a59bd95f8e1bc82baa3e804ca26de99b7e3bac7a7b75fd.exe 1784 7373997c5b9ad4ba98a59bd95f8e1bc82baa3e804ca26de99b7e3bac7a7b75fd.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1784 7373997c5b9ad4ba98a59bd95f8e1bc82baa3e804ca26de99b7e3bac7a7b75fd.exe 1784 7373997c5b9ad4ba98a59bd95f8e1bc82baa3e804ca26de99b7e3bac7a7b75fd.exe 1784 7373997c5b9ad4ba98a59bd95f8e1bc82baa3e804ca26de99b7e3bac7a7b75fd.exe 1784 7373997c5b9ad4ba98a59bd95f8e1bc82baa3e804ca26de99b7e3bac7a7b75fd.exe 1784 7373997c5b9ad4ba98a59bd95f8e1bc82baa3e804ca26de99b7e3bac7a7b75fd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7373997c5b9ad4ba98a59bd95f8e1bc82baa3e804ca26de99b7e3bac7a7b75fd.exe"C:\Users\Admin\AppData\Local\Temp\7373997c5b9ad4ba98a59bd95f8e1bc82baa3e804ca26de99b7e3bac7a7b75fd.exe"1⤵
- Drops desktop.ini file(s)
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282B
MD59e36cc3537ee9ee1e3b10fa4e761045b
SHA17726f55012e1e26cc762c9982e7c6c54ca7bb303
SHA2564b9d687ac625690fd026ed4b236dad1cac90ef69e7ad256cc42766a065b50026
SHA5125f92493c533d3add10b4ce2a364624817ebd10e32daa45ee16593e913073602db5e339430a3f7d2c44abf250e96ca4e679f1f09f8ca807d58a47cf3d5c9c3790