Analysis

  • max time kernel
    142s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 01:38

General

  • Target

    6f02f16bf43c6c3872ffb987a37cccb789a2d95480b68b9a20a1a7aefff752b7.exe

  • Size

    512KB

  • MD5

    164b5f30f5f77b6e74b2197869bd4cc6

  • SHA1

    93126f1f312c3a48fb5fdad0f2ad757c77f7b94c

  • SHA256

    6f02f16bf43c6c3872ffb987a37cccb789a2d95480b68b9a20a1a7aefff752b7

  • SHA512

    86da2c61879533032ed09bbc4533f01af215e30da7aae250cd510e95c80d9d60a817b249b630822ff385e85a337f6a70176f157b70a27226b9c9c5e9e8ce5c35

  • SSDEEP

    12288:GR41sKv76QD7ETeGAJE9OTn9bkLOy6zh9B3t1:GR4jeHTeGy2OT94izh

Score
9/10

Malware Config

Signatures

  • Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) 3 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f02f16bf43c6c3872ffb987a37cccb789a2d95480b68b9a20a1a7aefff752b7.exe
    "C:\Users\Admin\AppData\Local\Temp\6f02f16bf43c6c3872ffb987a37cccb789a2d95480b68b9a20a1a7aefff752b7.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    PID:5012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5012-1-0x0000000002D50000-0x0000000002E50000-memory.dmp

    Filesize

    1024KB

  • memory/5012-2-0x0000000004920000-0x000000000498B000-memory.dmp

    Filesize

    428KB

  • memory/5012-3-0x0000000000400000-0x000000000046F000-memory.dmp

    Filesize

    444KB

  • memory/5012-4-0x0000000000400000-0x0000000002CDF000-memory.dmp

    Filesize

    40.9MB

  • memory/5012-5-0x0000000000400000-0x0000000002CDF000-memory.dmp

    Filesize

    40.9MB

  • memory/5012-7-0x0000000002D50000-0x0000000002E50000-memory.dmp

    Filesize

    1024KB

  • memory/5012-8-0x0000000004920000-0x000000000498B000-memory.dmp

    Filesize

    428KB

  • memory/5012-9-0x0000000000400000-0x000000000046F000-memory.dmp

    Filesize

    444KB