Analysis

  • max time kernel
    136s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 21:41

General

  • Target

    TargetDir/Toolbox.exe

  • Size

    2.0MB

  • MD5

    5bf76395f7cc6fb3d8ca3366a3cebe0f

  • SHA1

    5be555b30d6f95f640856dca23cb94fe4d69c565

  • SHA256

    17e9dbb3f6f4ab7b699270681c4150cb69214e369d2b1d28b555cbe064b4ced3

  • SHA512

    e06ec2d3899c4cfb0a3091665d1f0e6d673c4949d576781bdf53097f39e5e9a40a97729c17aa708a46464cc517ccdb951b3e0e19ea2b0d9aca13176685d21b41

  • SSDEEP

    49152:xgMjYm5L8sz7O8xUfKf1EAsHg6Uh3Ab9dM2+zz3w29W/SNN0D8VLeb+7:xgMjnSmi8xUfKf1EA4g60G82+/A29W6V

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TargetDir\Toolbox.exe
    "C:\Users\Admin\AppData\Local\Temp\TargetDir\Toolbox.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Users\Admin\AppData\Local\Temp\CLMT6CLN.0001
      "C:\Users\Admin\AppData\Local\Temp\CLMT6CLN.0001" 1716 "C:\Users\Admin\AppData\Local\Temp\""CLMT6CLN.0001.dir.0000"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:636
  • C:\Program Files (x86)\Common Files\Creative Labs Shared\Service\MT6Licensing.exe
    "C:\Program Files (x86)\Common Files\Creative Labs Shared\Service\MT6Licensing.exe"
    1⤵
    • Executes dropped EXE
    • Writes to the Master Boot Record (MBR)
    PID:1996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\Creative Labs Shared\Service\MT6Licensing.exe

    Filesize

    77KB

    MD5

    d03466c36ef0e5c7694ff38b45271d9d

    SHA1

    fd29b4cb0cb6aeaf0d00cc9831bf2926a6a76209

    SHA256

    367e0c1f0c49c31f26ec6a8828fe5727d70c637fd8c4213d10e43c80a0ea259e

    SHA512

    d790ae64ba4d635fc6aab00a6069b3d83f30a4a0b2b337156b60bec50c7ea7da0fc0b187b15f2d66b75d2a938bd9ad9f5df9ee16c41fbe791661798a2fab7de4

  • C:\Users\Admin\AppData\Local\Temp\CLMT6CLN.0001

    Filesize

    58KB

    MD5

    9fef04a50f79295c036cf000b0366ef8

    SHA1

    3ad827d46332a3fcecbe233ca8ed40c34cd75606

    SHA256

    1935d7c352ddfb5e6caab256730b0978add0396347c072cfc0e8f45aa3f46d59

    SHA512

    7222d49cb730ab157d75ff5a6e83b7b4514337ce555ba547bd1146516cdce16ce6aa9a24c4fceae5746b4e2ed64781a57e82852b0f41adc0ac4524e14de4c193

  • C:\Users\Admin\AppData\Local\Temp\CLMT6CLN.0001.dir.0000\ActivationGui.dll

    Filesize

    252KB

    MD5

    b14c5bd247479ec095f54b3e4393502a

    SHA1

    5e0c96b864cf775c0e59228fe56af6600a74eb84

    SHA256

    e173db0236fd0b5f141a7e2a9aacd7239bf25c5b3a1f1ff2e87ffc1002dba491

    SHA512

    3c22ecce186b2b27d2c5df98bed3b65a9bbe968826120ef2b6402d51adea37edfe0c2f62ec68fec9826bbc70affea7041654178a5594a30a9da9d16d48074fa4

  • C:\Users\Admin\AppData\Local\Temp\CLMT6CLN.0001.dir.0000\ApiExShell.dll

    Filesize

    100KB

    MD5

    87023705114bea24825be4208c653dc8

    SHA1

    52fa9201c2ccb6156e64d583a9d8c39d44dec6ec

    SHA256

    51c5e5c3aefad9f12d8310e4b76428d9ac4c19590693f8d3d72fd9c86a094eab

    SHA512

    1586c6e20d508f6a0cae36931683fb88f8271125864f667cb24d7b87250b64e4e46d209b94bffc2eebf4baaa6dd189113ebdec61efd4dc6e8ed60e42b8ba4641

  • C:\Users\Admin\AppData\Local\Temp\CLMT6CLN.0001.dir.0000\PfdRun.pfd

    Filesize

    28KB

    MD5

    032bf633a0f8c2660bed431fbd1b1620

    SHA1

    3b8bac0206c63c6acaa2376b68fc643bbab9dc07

    SHA256

    3ca7adb25bdd7a371abc150892ce20b05456ed6fb5d33403378a2871a03a6b78

    SHA512

    fb4bf9e899a47e56c5ba34822cda57de6f27902f880f655b4e636ac11e124ef875c296e0b203b75ae8f9dcbd67e06be853568c0935936c211517450de2b30adc

  • C:\Users\Admin\AppData\Local\Temp\CLMT6CLN.0001.dir.0000\SCS Installer.dll

    Filesize

    287KB

    MD5

    1b8e43c6536cf66548ce3664d4efadf3

    SHA1

    394b83ed56e586790123ac43a44031f07062b8d7

    SHA256

    a854b2c384bdf6b571da6eef2c385758165c81c624f1dd7587d9d4ddbefd3c0c

    SHA512

    ae35937d9d338d059272463d93c2b6bd813f94ce65826898cecac3e1653ba096e7e0618418206372e91c37b61674ddf923bdece70283c604e47cd6c5335b14b2

  • C:\Users\Admin\AppData\Local\Temp\CLMT6CLN.0001.dir.0000\~de7256.tmp

    Filesize

    579KB

    MD5

    0016c87dd7615daf6761cb63942a4f83

    SHA1

    e43002da6d8284ddce961d2a96663ca044bdd306

    SHA256

    e7a2b34bbc3d38d7461710ec157fc59b7a7f088a34d9a9e169e0913b9c23fe53

    SHA512

    dc87106aa33eed7308e7db0060593978d54e1e3c1753b8e60a5ecc1521455ea5f215795a8777727ac52ba39586b6b659fa31cc763f1c9708aa32c463114066dc

  • C:\Users\Admin\AppData\Local\Temp\CLMT6CLN.0001.dir.0000\~df394b.tmp

    Filesize

    681KB

    MD5

    40e94cfda5dba901a7946cfcf92786f2

    SHA1

    80611328c6b303d2f138f37ed516501f02cece53

    SHA256

    cf3dc52e150cdfdb5cad6d124895cb06631051ab8ad0af94bd9432c528e871ad

    SHA512

    c4a003a83e63941ab7fcb0da01c6f269d0e989602c4e1d2753576f7ff6ed7d18adea3205218e4c6cd04e9d77cd0dd0a8d7cdba32f39db9de4cb2447bd4dd08d0

  • memory/1716-101-0x0000000066700000-0x0000000066855000-memory.dmp

    Filesize

    1.3MB

  • memory/1716-175-0x0000000066700000-0x0000000066855000-memory.dmp

    Filesize

    1.3MB

  • memory/1716-174-0x0000000066700000-0x0000000066855000-memory.dmp

    Filesize

    1.3MB

  • memory/1716-102-0x0000000066700000-0x0000000066855000-memory.dmp

    Filesize

    1.3MB

  • memory/1716-81-0x0000000066701000-0x0000000066712000-memory.dmp

    Filesize

    68KB

  • memory/1716-0-0x0000000000400000-0x000000000048F000-memory.dmp

    Filesize

    572KB

  • memory/1716-237-0x00000000025A0000-0x00000000025ED000-memory.dmp

    Filesize

    308KB

  • memory/1716-353-0x0000000066700000-0x0000000066855000-memory.dmp

    Filesize

    1.3MB

  • memory/1716-354-0x0000000000400000-0x000000000048F000-memory.dmp

    Filesize

    572KB