Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 04:05
Static task
static1
Behavioral task
behavioral1
Sample
fb326ae60a37fe1d72f7c0ec82632378.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
fb326ae60a37fe1d72f7c0ec82632378.exe
Resource
win10v2004-20240508-en
General
-
Target
fb326ae60a37fe1d72f7c0ec82632378.exe
-
Size
41.9MB
-
MD5
fb326ae60a37fe1d72f7c0ec82632378
-
SHA1
0de1b37e179a44f880e7ff49f4cc607b943958e9
-
SHA256
36d5fd64e38982141541a189be1167da8ce93559a5a2d0689a75553becac94d4
-
SHA512
b5a174a8131cbfbef847daaf00ea48ce80f0a3127f873c99e95619ed3e390738716723deaffdf76ea8da14a27a67d8304dfbe8154401a5dd4f7312f57cb5d99e
-
SSDEEP
786432:xwvnIe84yEZwcCUmeaeYzeyChA/tQ1/BJ754U/Hz4gQ7sCZzEECamVf:xwvn7yBVea3zFCK/8J75RvzZ6EEgVf
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2008 fb326ae60a37fe1d72f7c0ec82632378.exe 2008 fb326ae60a37fe1d72f7c0ec82632378.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 fb326ae60a37fe1d72f7c0ec82632378.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\LuDaShi\{2AC457D8-291D-48f8-92C0-B8AC9F66C7B2}.tmp\{DAFA0DD4-C7DB-4c0c-A38D-5F323768791B}.tf fb326ae60a37fe1d72f7c0ec82632378.exe File created C:\Program Files (x86)\LuDaShi\{ECEDA0C2-8251-45f9-B5BA-44951C8F9EBB}.tf fb326ae60a37fe1d72f7c0ec82632378.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2832 2008 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2832 2008 fb326ae60a37fe1d72f7c0ec82632378.exe 28 PID 2008 wrote to memory of 2832 2008 fb326ae60a37fe1d72f7c0ec82632378.exe 28 PID 2008 wrote to memory of 2832 2008 fb326ae60a37fe1d72f7c0ec82632378.exe 28 PID 2008 wrote to memory of 2832 2008 fb326ae60a37fe1d72f7c0ec82632378.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb326ae60a37fe1d72f7c0ec82632378.exe"C:\Users\Admin\AppData\Local\Temp\fb326ae60a37fe1d72f7c0ec82632378.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 10042⤵
- Program crash
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56c1a469a4a14ae03a28ed65264ba18c8
SHA19dd4c87a23240acf1267d5f1b651a9ecb0da21a5
SHA2560953b79fff754fdd76b4a428fcfab4752c8a1f765250aab629bebcfb5bd85509
SHA512d9851dabe2be00e949a0ee246bce97a7c851ce6f0dc594fdbf34f2d602b92c553fa4aafab091e2be76c034d2afbddb4102908ae6be67f6c23014ce3fbe3321c5
-
Filesize
1.1MB
MD52888126384d873cc49af32bbe34bb296
SHA1fe74877bcaec93c7d67dab2ce8c86cfc38402d22
SHA256aba19501a8033495664879e09e60e4788537d387cf038fa8769e5b178bccdcb4
SHA512f283b721b27d85fbc7a4e1e91ab1683da0c3888f632873625c4c2b48caa170471aaa84e107230988f615d3f43e40a640607d6e6f641aed59788dee441801748a
-
Filesize
231KB
MD59d145902fb5b9a6da62ac85761434e31
SHA1c817d77f59e3767d75cf5f5298d6b5711308f7e5
SHA25698d795d55329b1057f4fd590468e648a8c34b620207fd9a0a6953f3e98d1ea43
SHA512bbb3109bcd5ded909bfdaeb7f4f006fc5928a9bc501bad5ae8ba9805bc0d924a2c4da8bbd215480db936d663852abd9b0435fa241a40224a4cd93c4b7aff79a9