Analysis

  • max time kernel
    141s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    11/05/2024, 02:57

General

  • Target

    ffa291b7deb01d6a42d6997765848e0340bf5177746de01d275f843cdea864aa.exe

  • Size

    1.3MB

  • MD5

    5589728917e2c441a0b277d8048dea99

  • SHA1

    28d60f957570983336dfc6fd05c6be54bab43fa1

  • SHA256

    ffa291b7deb01d6a42d6997765848e0340bf5177746de01d275f843cdea864aa

  • SHA512

    8824c3ce8437261fdb7dbc06c43c4e9073ffdfa9eb481dad582300727290ed7c9a78a114bc823415d72ed7594cb3ef696bbbcdbdfd623c3ccd8229509306628a

  • SSDEEP

    24576:Fi+wfDe4soMiFgmj3rRLzRqDh8btwO6ijE5VA2TUBfnrZD:IDd3gmj3tLgDhqtwOf32opV

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 15 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffa291b7deb01d6a42d6997765848e0340bf5177746de01d275f843cdea864aa.exe
    "C:\Users\Admin\AppData\Local\Temp\ffa291b7deb01d6a42d6997765848e0340bf5177746de01d275f843cdea864aa.exe"
    1⤵
    • Checks BIOS information in registry
    • Writes to the Master Boot Record (MBR)
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies system certificate store
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8A4AA6A226E1870F0261713C59F1CB84

    Filesize

    983B

    MD5

    42f8529fe545103fdd848980a8647f29

    SHA1

    ca7788c32da1e4b7863a4fb57d00b55ddacbc7f9

    SHA256

    a6cf64dbb4c8d5fd19ce48896068db03b533a8d1336c6256a87d00cbb3def3ea

    SHA512

    1a3994c12d65e9c96b4c4ebcf79e8b291b620177520a7d0482a2b6043dd150a9f2ce1627d130309390e3ac6be98af5f2b50c1993c478976d0c9a9638c46a61bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    be1e2040a7d5162cef8ce90eb14283f6

    SHA1

    2c8060b86dde9d7182b441bb27c244603d71e39b

    SHA256

    438d067b571fd80f584cbaf1e4a64744b736d02fdea9e52855154611417bd5cd

    SHA512

    610c30bfe149518ccee7addfaa42c179cf8b26f7b33de85ce3df6e49762bbe0347a4902c66e9674d2609cdf67152e5c01e64af1cbac292fc03e020e438a873b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    46635c3b0b65801795516444c2c5edb2

    SHA1

    3680a57ea660a62a47270a8e39ee97c66bd27462

    SHA256

    1022e1034fb5b2c3de76db91fb0f2bde047bdd02d30ac15b6088ecac27d1c313

    SHA512

    63df6a1a15a36bb4d3a1d3d91a28cc01a8b9b7811479e92206da8b1881c5b58bacd6e217d09058186dd04bba7f89f19ce4c0165022edd328b401f44cbfd72390

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ff6118d35881f565e36afdefd77dc682

    SHA1

    7e2043bc27d6838665adcdd7023231e484a2aaa4

    SHA256

    c57053009d826da73a9bb1f8bbb44d1f2a1a6006f4fc1cab287cffc3bfd4a2da

    SHA512

    aa62c7e2cb92e03ace8c5a8bfbf14a13c031abf3d084f68d7ff0a47660e8cdc13a98863a20fcbab5e55e309342b19ea3b471483b2eeff1f14095c70f2860bac6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    90aa5e279278144c384ec7ad229a6984

    SHA1

    9f5a2365e944fecba7ba07e7cd6f399070ad9001

    SHA256

    1191e90777b76d1408c92ae49762f49fd47b3cc5b2c6c1cd710c3a8c6d68e04e

    SHA512

    ca9c488a5b520b09021bef36cc86db22cbc3ba4f4659370d2fcb4ade98c33a1821b6cdb2beb2e60d94b3f8e36dfd71953ed20bb5c3940a21f8c94330903d5e06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    a4f62d7e9f793e4f5c5d2d17d52fa0e5

    SHA1

    cd6a4833931c10b690aa63547cdab531df70f6b2

    SHA256

    a34403723c38645670ba98a79c881b0de7b4154a8edcbf1343d9add8b830b4d4

    SHA512

    543538fb7fa42bd81306cd23a62470364ad4bf2604ef291dfcf5945928185af1f23e8168b7e5d46dbc08c4404b73f3f8135283f66746fe0c59713751ae1e1976

  • C:\Users\Admin\AppData\Local\Temp\Tar128A.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/2188-0-0x0000000000400000-0x000000000074D000-memory.dmp

    Filesize

    3.3MB

  • memory/2188-1-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/2188-343-0x0000000000400000-0x000000000074D000-memory.dmp

    Filesize

    3.3MB

  • memory/2188-345-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB