Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21-07-2024 19:59
Static task
static1
Behavioral task
behavioral1
Sample
c0176891a44d7a205efa8eed64db2a167b2a02624198021fa3fadfd21a0228e9.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c0176891a44d7a205efa8eed64db2a167b2a02624198021fa3fadfd21a0228e9.exe
Resource
win10v2004-20240709-en
General
-
Target
c0176891a44d7a205efa8eed64db2a167b2a02624198021fa3fadfd21a0228e9.exe
-
Size
3.5MB
-
MD5
243145f5b1c859bcf1473dc332ecb95e
-
SHA1
a7c039fd256e9b7939400b9286051deb102d5c47
-
SHA256
c0176891a44d7a205efa8eed64db2a167b2a02624198021fa3fadfd21a0228e9
-
SHA512
4c81d9005525fcbfd1d7ddc328c434908ca909f5d01e7b228c43163b81f577631b07aa7ccfaf3d5e565e72318d30144a10f4a6597ca7bfee51dd521ff35c4590
-
SSDEEP
49152:v+wzGIZZ/01NG9bNypGXWk7CUF9+UUTOexfHiWg8j4JxIMAU5PyMeTajSLHOBCo0:mUGOZ/4WT57CUeDxKtnAYqNTgjcKg
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 c0176891a44d7a205efa8eed64db2a167b2a02624198021fa3fadfd21a0228e9.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2400 systeminfo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2036 c0176891a44d7a205efa8eed64db2a167b2a02624198021fa3fadfd21a0228e9.exe 2036 c0176891a44d7a205efa8eed64db2a167b2a02624198021fa3fadfd21a0228e9.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2352 2036 c0176891a44d7a205efa8eed64db2a167b2a02624198021fa3fadfd21a0228e9.exe 30 PID 2036 wrote to memory of 2352 2036 c0176891a44d7a205efa8eed64db2a167b2a02624198021fa3fadfd21a0228e9.exe 30 PID 2036 wrote to memory of 2352 2036 c0176891a44d7a205efa8eed64db2a167b2a02624198021fa3fadfd21a0228e9.exe 30 PID 2036 wrote to memory of 2352 2036 c0176891a44d7a205efa8eed64db2a167b2a02624198021fa3fadfd21a0228e9.exe 30 PID 2352 wrote to memory of 2400 2352 cmd.exe 32 PID 2352 wrote to memory of 2400 2352 cmd.exe 32 PID 2352 wrote to memory of 2400 2352 cmd.exe 32 PID 2352 wrote to memory of 2400 2352 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0176891a44d7a205efa8eed64db2a167b2a02624198021fa3fadfd21a0228e9.exe"C:\Users\Admin\AppData\Local\Temp\c0176891a44d7a205efa8eed64db2a167b2a02624198021fa3fadfd21a0228e9.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\cmd.execmd.exe /c systeminfo2⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:2400
-
-