Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 14:52

General

  • Target

    9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe

  • Size

    2.4MB

  • MD5

    4da19bf7071ce56ab19b1415b6eb0847

  • SHA1

    431d194ed73769e68d0b8660d7dbaac32caef34c

  • SHA256

    9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746

  • SHA512

    59b26572c0891b04246a44ec54b81caf4350e9e5643842e7b75f433af13239fdfaf417056161a6fab4204d48c94408448ff588d484dcfb63bf9ffdb3dcbac5ed

  • SSDEEP

    49152:JoNgRf9tTkvqHWzKVcBd6o6nt2rK09G4lyo0ZacSiLUswRI/CIJA:J+Qf7cqA0bt2rK09cohiLUbQJJA

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe
    "C:\Users\Admin\AppData\Local\Temp\9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c wmic cpu get name/value
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4612
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic cpu get name/value
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3320
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c wmic Path Win32_DisplayConfiguration get DeviceName/value
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5440
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic Path Win32_DisplayConfiguration get DeviceName/value
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:5840
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c wmic COMPUTERSYSTEM get TotalPhysicalMemory/value
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5808
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic COMPUTERSYSTEM get TotalPhysicalMemory/value
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1628-0-0x0000000000400000-0x0000000000873000-memory.dmp

    Filesize

    4.4MB

  • memory/1628-1-0x0000000074CE0000-0x0000000074D27000-memory.dmp

    Filesize

    284KB

  • memory/1628-508-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-510-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-512-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-522-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-524-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-520-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-518-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-516-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-514-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-506-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-504-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-503-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-526-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-538-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-558-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-542-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-565-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-562-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-560-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-556-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-554-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-552-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-550-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-548-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-546-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-544-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-540-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-536-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-534-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-532-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-530-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-528-0x00000000027D0000-0x00000000028E1000-memory.dmp

    Filesize

    1.1MB

  • memory/1628-7990-0x0000000000400000-0x0000000000873000-memory.dmp

    Filesize

    4.4MB