Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 17:13

General

  • Target

    6711240c87650fa1c068a6e0bd33a8a00d06adfa390212221c5c7847fcdf72d8.exe

  • Size

    2.4MB

  • MD5

    7af82424a071ac8c9913c5c803bac1c7

  • SHA1

    abf4d0f039e730fe96c6e81f41d6b6df5ad910f7

  • SHA256

    6711240c87650fa1c068a6e0bd33a8a00d06adfa390212221c5c7847fcdf72d8

  • SHA512

    1d3758dbe187af88540fde1620b32127f3ed861b438d64836f8433912fe4b6d8a3304dcea9bd76db1c372ba34c94dd2b5cc9e4b7f9d50981fad429e513a71c42

  • SSDEEP

    49152:JoNgRf9tTkvqHWzKVcBd6o6nt2rK09G4lyo0ZacSiLUswRI/CIJY:J+Qf7cqA0bt2rK09cohiLUbQJJY

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6711240c87650fa1c068a6e0bd33a8a00d06adfa390212221c5c7847fcdf72d8.exe
    "C:\Users\Admin\AppData\Local\Temp\6711240c87650fa1c068a6e0bd33a8a00d06adfa390212221c5c7847fcdf72d8.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c wmic cpu get name/value
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:11260
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic cpu get name/value
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1784
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c wmic Path Win32_DisplayConfiguration get DeviceName/value
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:924
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic Path Win32_DisplayConfiguration get DeviceName/value
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:380
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c wmic COMPUTERSYSTEM get TotalPhysicalMemory/value
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1648
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic COMPUTERSYSTEM get TotalPhysicalMemory/value
        3⤵
          PID:1168

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Pre-OS Boot

    1
    T1542

    Bootkit

    1
    T1542.003

    Defense Evasion

    Pre-OS Boot

    1
    T1542

    Bootkit

    1
    T1542.003

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2356-0-0x0000000000400000-0x0000000000873000-memory.dmp
      Filesize

      4.4MB

    • memory/2356-1-0x0000000075590000-0x00000000755D7000-memory.dmp
      Filesize

      284KB

    • memory/2356-503-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-504-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-508-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-529-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-507-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-522-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-526-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-532-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-530-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-540-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-524-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-520-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-554-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-518-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-516-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-514-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-512-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-510-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-564-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-562-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-560-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-558-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-557-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-552-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-550-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-548-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-546-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-544-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-542-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-538-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-536-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-534-0x00000000028C0000-0x00000000029D1000-memory.dmp
      Filesize

      1.1MB

    • memory/2356-2239-0x0000000002610000-0x0000000002791000-memory.dmp
      Filesize

      1.5MB

    • memory/2356-7991-0x0000000000400000-0x0000000000873000-memory.dmp
      Filesize

      4.4MB