Analysis
-
max time kernel
127s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 11:33
Static task
static1
Behavioral task
behavioral1
Sample
3607b05b96530494b0bb7b1ff83691cf48a67a960211452e0333f1b9e00ec441.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3607b05b96530494b0bb7b1ff83691cf48a67a960211452e0333f1b9e00ec441.exe
Resource
win10v2004-20240802-en
General
-
Target
3607b05b96530494b0bb7b1ff83691cf48a67a960211452e0333f1b9e00ec441.exe
-
Size
4.8MB
-
MD5
5ce390518ccc5671235230cae228fc20
-
SHA1
e687aeae15e2427f421afadf43f182a16c4a0fcb
-
SHA256
3607b05b96530494b0bb7b1ff83691cf48a67a960211452e0333f1b9e00ec441
-
SHA512
df901a50fed0dcbb395ee1790a71af20ce567222117bebad54b0c5374766cbceb2111d16c5fab0e721bd27240b9e8fc4ff3825dee635a9caa30e4880ea085f86
-
SSDEEP
98304:WeLpmrmc2lAu28lkcf5YjovKqGYiOE8oLj5dIClU3OOQO+YQ:FcmZl85gyjovK65E8oEClU3oO1Q
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 2032 3607b05b96530494b0bb7b1ff83691cf48a67a960211452e0333f1b9e00ec441.exe 2032 3607b05b96530494b0bb7b1ff83691cf48a67a960211452e0333f1b9e00ec441.exe 2032 3607b05b96530494b0bb7b1ff83691cf48a67a960211452e0333f1b9e00ec441.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 3607b05b96530494b0bb7b1ff83691cf48a67a960211452e0333f1b9e00ec441.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3607b05b96530494b0bb7b1ff83691cf48a67a960211452e0333f1b9e00ec441.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3607b05b96530494b0bb7b1ff83691cf48a67a960211452e0333f1b9e00ec441.exe"C:\Users\Admin\AppData\Local\Temp\3607b05b96530494b0bb7b1ff83691cf48a67a960211452e0333f1b9e00ec441.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:2032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
234KB
MD5cd03029957ebc78c0ca7a6c02a9ca846
SHA10044114b8073781479044f0294701be9611be2ac
SHA256139fdd92e6ddf1aac0761a68502b374daa32e82039621018511dc491ed9b4048
SHA51214c641cb9536def0ddc1969d50b97b83a23017c97373e3ad74d3fbf9825ac81f3fdf8169281c8ad4cebd45d9c9ae05f752d553ba4653e620889b274479cb7c32
-
Filesize
2.1MB
MD5c35ab236702291f1a2d090af8ea253d9
SHA1d7f58f0f5fee6b26564af3c5d7ab6defe5a4608d
SHA256c4dba892a9a1fb675d06dd615c4fc079e9f4e12a8368e8bd18e37137ed567f35
SHA51287a3fa1927ad2fad117055411a471be95275a4d4bf99ee3ab522faee70067b239bb77ddd94c4300958607efd4a3fc071df2262754557fca2530e70f2c438a068
-
Filesize
1.1MB
MD5a46135bdd574092d85955070e72d5aad
SHA1aad137b0a883fea22b7118778512ffc7865513bc
SHA256aa57160684feb240a85da677caaf7cf6a08b7349d89ae9cb4a3476884d80aac5
SHA51272188f348d9ae33e2b5a7886c80667cc3015bfac170249537baa9e31abf8d63ca198903206feb64887f1d509a1b9bfc9f54ede8b3aa26bee3f5c4375e5c6a24b