Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 17:52
Static task
static1
Behavioral task
behavioral1
Sample
62a681f9c75e1c21d08f9634d064f591af99ed019d91c45a42a6daf92245a27b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
62a681f9c75e1c21d08f9634d064f591af99ed019d91c45a42a6daf92245a27b.exe
Resource
win10v2004-20240508-en
General
-
Target
62a681f9c75e1c21d08f9634d064f591af99ed019d91c45a42a6daf92245a27b.exe
-
Size
15.5MB
-
MD5
21445b2984b5be0673ae1962f743f64f
-
SHA1
da7ddcf8452cec5df6f635f0c23e9a9109363b07
-
SHA256
62a681f9c75e1c21d08f9634d064f591af99ed019d91c45a42a6daf92245a27b
-
SHA512
e84dd6746e0287a6b882f63526fcc5902c2714e8fc6187ed3f8f6ae6336903a4b0f11e17e918ab7f3afab3c0c9a2e18ef067ba68169bd0157cf96c10b1979dbc
-
SSDEEP
393216:AulgrK+BzVFWfHjvxLkuoptlXps6wr3KUTIiViiQd6c2DdZlgSwc165UbZBVepgU:AulgrK+BzVFWfHjvxLkuoptlXps1r3KZ
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1988 62a681f9c75e1c21d08f9634d064f591af99ed019d91c45a42a6daf92245a27b.exe -
resource yara_rule behavioral1/memory/1988-0-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1988-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1988-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1988-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1988-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1988-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1988-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1988-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1988-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1988-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1988-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1988-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1988-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1988-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1988-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1988-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1988-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1988-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1988-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1988-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1988-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1988-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1988-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1988-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1988-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1988-7-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 62a681f9c75e1c21d08f9634d064f591af99ed019d91c45a42a6daf92245a27b.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1988 62a681f9c75e1c21d08f9634d064f591af99ed019d91c45a42a6daf92245a27b.exe 1988 62a681f9c75e1c21d08f9634d064f591af99ed019d91c45a42a6daf92245a27b.exe 1988 62a681f9c75e1c21d08f9634d064f591af99ed019d91c45a42a6daf92245a27b.exe 1988 62a681f9c75e1c21d08f9634d064f591af99ed019d91c45a42a6daf92245a27b.exe 1988 62a681f9c75e1c21d08f9634d064f591af99ed019d91c45a42a6daf92245a27b.exe 1988 62a681f9c75e1c21d08f9634d064f591af99ed019d91c45a42a6daf92245a27b.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1988 62a681f9c75e1c21d08f9634d064f591af99ed019d91c45a42a6daf92245a27b.exe 1988 62a681f9c75e1c21d08f9634d064f591af99ed019d91c45a42a6daf92245a27b.exe 1988 62a681f9c75e1c21d08f9634d064f591af99ed019d91c45a42a6daf92245a27b.exe 1988 62a681f9c75e1c21d08f9634d064f591af99ed019d91c45a42a6daf92245a27b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\62a681f9c75e1c21d08f9634d064f591af99ed019d91c45a42a6daf92245a27b.exe"C:\Users\Admin\AppData\Local\Temp\62a681f9c75e1c21d08f9634d064f591af99ed019d91c45a42a6daf92245a27b.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD52d6313a764ee4837c0fd29f5fc6d8400
SHA17dd49801129fed7ca0b03813faf60989e02882b9
SHA25679ac2c4eccf51605a79723a551a82d319247f0fedb7c1042500a76b2ddd98e28
SHA51221b82791f3ad190dcf57868241b552a4c76780052a4b8097ac17202a77af52829beb215b90f98e6734592d850325b144c4ee7269738818703d83ebbe8ed73cf0
-
Filesize
680B
MD5d3c17cf1142cebae11d0f71e1a7f351c
SHA1b946a1642b7901490ea58904f31183d836ba46fd
SHA25654bfc72888f5beaa99b5ebe80d2f00fdd57e3f1a043f7ee2e7875bf7fcf09ea0
SHA5123e816def8acb4c69de3f971deb8a4be743ef4937a41662c509fbe4c66ddc795a0737a3431d6baa98240030cee073b38b5e21676e39f0f9897e573e5aa427f122
-
Filesize
500B
MD5487a747cc9eaa12e71cfdd65f3abbd87
SHA1bdc1aa685ead0c1a9ce95028a5fe5307b0e6296e
SHA256db52fe3d4963df841bbc5df3f864b24ac6a730356bb6ae00f995cf6f05d95033
SHA5129d158204f8200bbc523cfac29b9f3108c99b504c841f8a3b4b4299be230cd645a65d61794a08d08f775fe0ae1f4ad86590d98e63d74cc6c76d21864a0e2aeec4
-
Filesize
260B
MD5077a4e92f30540bc4e828ad6e0b9dbaf
SHA11bb36b30da9e9455866777fe563e4bf677c39a89
SHA2565020d0ed5042396a545ac4f42b8596e9fb6fada7448872367a2ac93e18b3ce19
SHA51249a70b9531c46f636869bacb2766be65a38cb23a067b7966c217246e3c55023420a48b886638e29b45e8d30845e07d29b0863dc149823f21970e6968c404d36b
-
Filesize
932B
MD5526b33d6e25e572c98c18b957de023c6
SHA1696d80cce0b556a3985b10f0d1e420d6d8611b66
SHA2560e4b9a772f643cbdac8a2b2581fa0f94ba6d8d5be18093d648f952d5e1f18070
SHA5128f2e91ad42904e7d54aba4a08385ead93db2807f53ae8785b1934f9939f893f7ce06b4a6e314e76847d8b372ddfde175014ecbbd81427e96fa33121d612d3b88
-
Filesize
1KB
MD5594424ef33848db9638a62f597fb59f8
SHA190ffd651bcf8ef5c4da46ae8040f1bde78b8f034
SHA256c1ae2d1e03a11c86b69412f87ecd9435b0b557d8f81779ce85cf2ff495ba65e9
SHA512cc83bc3c9a66c3625d45e98254a9eab3a041f4340933ea30662cd29521a1a4c89850839f89491a179b91ad516ffbd37a105e818739f48c9424ce98894d6c7865
-
Filesize
500B
MD5bbd38571891bddbb3c1a03db890fdcbb
SHA1831eb3f2d76727ed638bd09993fa965106115780
SHA256d963ea083cda0ab5d5dced506129a5a991b8cb78af32e44b6171c96111c63d24
SHA51273aae33d056b9b159277f1935016d0e553d54c4b3c20cb3a1fb7cd829cef5aa8c837ecb99a925c74048e0dcb96b2dd8e99fbf56c8dfbb6f8cd4b4baf14afb6e6
-
Filesize
275KB
MD5048e7dbf0f02c825ff6f657f6efe8455
SHA10b36c38e8ba2c066ae9d7389a8d9e2ef705efe6f
SHA2562f014c514ee00b663911ac3819fe17bd2bc9de337ee03805c7a2ce7f1d1a466b
SHA512e617b42b5511142be6e26c9f04b5d5e54e496844a60e9fdcda58a015c5255d459dbf775d238479666801579c85ada9d37feccd2a2564725b776fd134b495058c