Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    05-07-2024 10:17

General

  • Target

    Module/ISGP.exe

  • Size

    100KB

  • MD5

    3218ba2cb712c78bd276e5969987006b

  • SHA1

    8db08d7960188f91d61ded80d81bf45df928a5c4

  • SHA256

    f3a3dfbc012ee1755b1f855ca5a814ed07f48b2c0de5b5083ee0c80fab84ee90

  • SHA512

    37c7ccb94a2a7eb2cba9344b580a6a3f21520a2e5f50b92a026d0f7a777742b6e2b71a836a81414ec6231b9eba838399962304a2f7696691a07b92c0f80b8abf

  • SSDEEP

    1536:lI0VjKKIQ07HNyzkh4ngYCV8PjfI1UeO04m+PtsmPQQ:lDjKKIQ0hy2sgYCajfI1UeO04m+MQ

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Module\ISGP.exe
    "C:\Users\Admin\AppData\Local\Temp\Module\ISGP.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/848-0-0x00000000002D0000-0x00000000002ED000-memory.dmp

    Filesize

    116KB

  • memory/848-1-0x0000000001ED0000-0x0000000001EED000-memory.dmp

    Filesize

    116KB

  • memory/848-2-0x0000000002020000-0x0000000002032000-memory.dmp

    Filesize

    72KB

  • memory/848-3-0x0000000002040000-0x0000000002086000-memory.dmp

    Filesize

    280KB