Analysis

  • max time kernel
    141s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25-06-2024 09:34

General

  • Target

    Keygen.exe

  • Size

    260KB

  • MD5

    a458bf86efbfbcd42a3db21de04f45af

  • SHA1

    733c7a397c6f967efa458756720eb0996fe2b495

  • SHA256

    e5a1609536db48a27c5645d956cadab4b4b1ad4e6511ea20d8a4710a18833e8a

  • SHA512

    e96710c99e3e200991e102c04d4ab0713c62ec91171e2cb7d2abee943445878af0d468970654b4cb7f49a10848ee2e920372b065931baab81d1b20859b7c7a23

  • SSDEEP

    6144:uXmwxUoKBpNpxu8F9BBFBXzxgugwvP6bQ7yMP+DE8276Ek:CCoeFTR56uJ6b7MP+Dd2GX

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Modifies registry class 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Keygen.exe
    "C:\Users\Admin\AppData\Local\Temp\Keygen.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\kg318C.tmp

    Filesize

    175KB

    MD5

    6723a7547713740bc9a277846735a462

    SHA1

    7e39045ef57cfe76a5608fa8602da7172a385990

    SHA256

    324549abe99a010c64879dc5c73800f502ad3eeea13447d97183abbf89eb5afe

    SHA512

    7fd04d80e05e3ece49dfaf27b1a82c6f899b6c2c8108c2432af1d9bc66fa28f99e4a36912e39a19e713d07536c2403918fbca3c0bca58908fad576f7a88e0c50

  • memory/2368-4-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2368-3-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/2368-2-0x0000000000260000-0x0000000000290000-memory.dmp

    Filesize

    192KB

  • memory/2368-1-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB

  • memory/2368-6-0x0000000002470000-0x00000000024A1000-memory.dmp

    Filesize

    196KB

  • memory/2368-9-0x0000000001E60000-0x0000000001E61000-memory.dmp

    Filesize

    4KB

  • memory/2368-8-0x0000000001F90000-0x0000000001F91000-memory.dmp

    Filesize

    4KB

  • memory/2368-10-0x0000000001FA0000-0x0000000001FA1000-memory.dmp

    Filesize

    4KB

  • memory/2368-11-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB

  • memory/2368-12-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB

  • memory/2368-13-0x0000000002470000-0x00000000024A1000-memory.dmp

    Filesize

    196KB

  • memory/2368-14-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB

  • memory/2368-17-0x0000000002470000-0x00000000024A1000-memory.dmp

    Filesize

    196KB

  • memory/2368-16-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB

  • memory/2368-18-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB

  • memory/2368-20-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB

  • memory/2368-22-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB

  • memory/2368-24-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB

  • memory/2368-26-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB

  • memory/2368-28-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB

  • memory/2368-30-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB

  • memory/2368-32-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB

  • memory/2368-34-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB

  • memory/2368-36-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB

  • memory/2368-38-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB