Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 07:00

General

  • Target

    77b172c86652d811e40b17003c34987fd8bdfe8d415712aefbdab4a43b637622.exe

  • Size

    9.9MB

  • MD5

    add73c9376cadb3c29370162f18ea8cb

  • SHA1

    a35a42bb55eea73b8800d39c77e0e33bb85cbe00

  • SHA256

    77b172c86652d811e40b17003c34987fd8bdfe8d415712aefbdab4a43b637622

  • SHA512

    41ab9ff20c3e426ba414067bc32f89cabc11fc1329ea74b8a5736d51f942792e1c82b58ee9dfb38fc3acf56f9c5ff156a8fb7af2e7c46b231365a94ba388758a

  • SSDEEP

    196608:/BzJo+aWJuiDGoLHsBw2HORWbH/eBMDH23k/l/Es28f:/BlTa+uqdLHkw0SWSB4qk/l/Es2

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77b172c86652d811e40b17003c34987fd8bdfe8d415712aefbdab4a43b637622.exe
    "C:\Users\Admin\AppData\Local\Temp\77b172c86652d811e40b17003c34987fd8bdfe8d415712aefbdab4a43b637622.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c systeminfo
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2648
      • C:\Windows\SysWOW64\systeminfo.exe
        systeminfo
        3⤵
        • Gathers system information
        PID:2640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2332-0-0x0000000000400000-0x00000000015A0000-memory.dmp

    Filesize

    17.6MB

  • memory/2332-3-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2332-36-0x0000000000777000-0x0000000000BBA000-memory.dmp

    Filesize

    4.3MB

  • memory/2332-35-0x0000000000320000-0x0000000000321000-memory.dmp

    Filesize

    4KB

  • memory/2332-33-0x0000000000320000-0x0000000000321000-memory.dmp

    Filesize

    4KB

  • memory/2332-30-0x0000000000310000-0x0000000000311000-memory.dmp

    Filesize

    4KB

  • memory/2332-28-0x0000000000310000-0x0000000000311000-memory.dmp

    Filesize

    4KB

  • memory/2332-25-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB

  • memory/2332-23-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB

  • memory/2332-20-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB

  • memory/2332-18-0x00000000002F0000-0x00000000002F1000-memory.dmp

    Filesize

    4KB

  • memory/2332-15-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/2332-13-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/2332-11-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/2332-10-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/2332-8-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/2332-6-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/2332-5-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2332-1-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2332-37-0x0000000000400000-0x00000000015A0000-memory.dmp

    Filesize

    17.6MB

  • memory/2332-42-0x0000000000400000-0x00000000015A0000-memory.dmp

    Filesize

    17.6MB

  • memory/2332-43-0x0000000000777000-0x0000000000BBA000-memory.dmp

    Filesize

    4.3MB