Analysis

  • max time kernel
    117s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 05:49

General

  • Target

    55be64735aadf23ccfb4b895dff0c2c98c700bf224608466136871fd971e7269.exe

  • Size

    8.2MB

  • MD5

    d7cd027d0216f9093b6143bdbdabdd41

  • SHA1

    180a2c274859f51859249027950ba670dba567e5

  • SHA256

    55be64735aadf23ccfb4b895dff0c2c98c700bf224608466136871fd971e7269

  • SHA512

    45f51404061bf47f7db01b8ffac9a7459bfd446ea2aedc76254d4041ecb32f7d892a4899a483238e5dddc93aa2ad0a62fea35581fb6de9bc6caffc0880902eaf

  • SSDEEP

    196608:elxoGSzd2JPqIsNe7PA3iRYX8ZDGF1v+n7lSImbm:2xukgNS43iRYs4FR+n7ln

Score
8/10

Malware Config

Signatures

  • Manipulates Digital Signatures 1 TTPs 1 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Maps connected drives based on registry 3 TTPs 3 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55be64735aadf23ccfb4b895dff0c2c98c700bf224608466136871fd971e7269.exe
    "C:\Users\Admin\AppData\Local\Temp\55be64735aadf23ccfb4b895dff0c2c98c700bf224608466136871fd971e7269.exe"
    1⤵
    • Manipulates Digital Signatures
    • Maps connected drives based on registry
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Checks processor information in registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1776-10-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/1776-40-0x0000000002C80000-0x0000000002C81000-memory.dmp

    Filesize

    4KB

  • memory/1776-38-0x0000000002C80000-0x0000000002C81000-memory.dmp

    Filesize

    4KB

  • memory/1776-43-0x0000000000400000-0x00000000013FF000-memory.dmp

    Filesize

    16.0MB

  • memory/1776-36-0x0000000002C80000-0x0000000002C81000-memory.dmp

    Filesize

    4KB

  • memory/1776-44-0x0000000000400000-0x00000000013FF000-memory.dmp

    Filesize

    16.0MB

  • memory/1776-35-0x0000000001440000-0x0000000001441000-memory.dmp

    Filesize

    4KB

  • memory/1776-45-0x0000000000400000-0x00000000013FF000-memory.dmp

    Filesize

    16.0MB

  • memory/1776-33-0x0000000001440000-0x0000000001441000-memory.dmp

    Filesize

    4KB

  • memory/1776-31-0x0000000001440000-0x0000000001441000-memory.dmp

    Filesize

    4KB

  • memory/1776-30-0x0000000001420000-0x0000000001421000-memory.dmp

    Filesize

    4KB

  • memory/1776-28-0x0000000001420000-0x0000000001421000-memory.dmp

    Filesize

    4KB

  • memory/1776-25-0x0000000001410000-0x0000000001411000-memory.dmp

    Filesize

    4KB

  • memory/1776-23-0x0000000001410000-0x0000000001411000-memory.dmp

    Filesize

    4KB

  • memory/1776-20-0x0000000001400000-0x0000000001401000-memory.dmp

    Filesize

    4KB

  • memory/1776-18-0x0000000001400000-0x0000000001401000-memory.dmp

    Filesize

    4KB

  • memory/1776-15-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/1776-13-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/1776-42-0x0000000000400000-0x00000000013FF000-memory.dmp

    Filesize

    16.0MB

  • memory/1776-8-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/1776-6-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/1776-5-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/1776-3-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/1776-1-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/1776-0-0x0000000000688000-0x0000000000BD6000-memory.dmp

    Filesize

    5.3MB

  • memory/1776-48-0x0000000000400000-0x00000000013FF000-memory.dmp

    Filesize

    16.0MB

  • memory/1776-49-0x0000000000688000-0x0000000000BD6000-memory.dmp

    Filesize

    5.3MB