Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 16:32

General

  • Target

    7boot.exe

  • Size

    264KB

  • MD5

    b1e7a0ab4fe9186aece0cd7d0f96f569

  • SHA1

    82570041e123b1b078cf8daa6da77450ceee5978

  • SHA256

    e42ff63a5e2066de32e0f1121dc3e90b6810fa0af2aee5f760e3486375fbae55

  • SHA512

    8806ab4dcacd01d9e13af8b6eb5311dadba7d58413559eceed2d28a44c2ef10729d4d4bb39616099e0bcf2f095ef3abc19a80661363ade009315f548c6ab2ccb

  • SSDEEP

    6144:2zG8nriOnW/rGgGcHkf3LrMOdHY6C3LBo1Ov2yoLK0:O1DYrVkf3L3NY56/j

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7boot.exe
    "C:\Users\Admin\AppData\Local\Temp\7boot.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Program Files (x86)\Skin Pack\Lion\unistall.cmd" "
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2328
      • C:\Program Files (x86)\Skin Pack\Lion\Win7BootUpdaterCmd.exe
        Win7BootUpdaterCmd /restore
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Skin Pack\Lion\unistall.cmd

    Filesize

    27B

    MD5

    b1ce10f72a52820540050951c6154f53

    SHA1

    f7230ff1efc5591b3fbb6ea121f9121a4b467db3

    SHA256

    6231cd409972524bb08297919786447d56ca6c26fcd34b82d9bc6c5018887d4f

    SHA512

    270d0d9fd15a7e6d8809c10bceefc5b0e117bf579a1944bd9a98289c480067c606c353eb17001899eb956d4dd3af175dc7bd4603c35e438fb07f96c5e4526169

  • \Program Files (x86)\Skin Pack\Lion\Win7BootUpdaterCmd.exe

    Filesize

    272KB

    MD5

    4c26092f628205e2a8302c190d5f12bc

    SHA1

    c7474941ed2a3dbb02e12040595ea9cd56145e01

    SHA256

    b3674e5f0693201bc7d55005220fe26753baf833d86e75f2363a5dbdb2480ed1

    SHA512

    e4bcf831261253140a33265c8ae51b77f9f5f6ecfa914f313824bf199e8f2131b9df7e4adf3430c0850e234d731f4774ace7b7e6c82176ce1a6e4f8fab3cb49e

  • memory/2060-30-0x00000000744D1000-0x00000000744D2000-memory.dmp

    Filesize

    4KB

  • memory/2060-31-0x00000000744D0000-0x0000000074A7B000-memory.dmp

    Filesize

    5.7MB

  • memory/2060-32-0x00000000744D0000-0x0000000074A7B000-memory.dmp

    Filesize

    5.7MB

  • memory/2060-33-0x00000000744D0000-0x0000000074A7B000-memory.dmp

    Filesize

    5.7MB

  • memory/2356-35-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB