Analysis

  • max time kernel
    119s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14-09-2024 21:54

General

  • Target

    8faa39645a93063dba6029b7375ebecfa6fde50d5343f872041296b4374b1760.exe

  • Size

    2.4MB

  • MD5

    e17aefe831d5f047372ba7810b711c48

  • SHA1

    524435d95713a9e3cd3e039ef786a0c0dcbf3f46

  • SHA256

    8faa39645a93063dba6029b7375ebecfa6fde50d5343f872041296b4374b1760

  • SHA512

    e9a08d9c6621837bbe4c1e89462721a6166f17bbeb966b84d6442f4db077f06659108003386859ac3ef937abf0adfd37b2bbd2ab7fedfbb9fa67efbbbb1517ae

  • SSDEEP

    49152:JoNgRf9tTkvqHWzKVcBd6o6nt2rK09G4lyo0ZacSiLUswRI/CIJH:J+Qf7cqA0bt2rK09cohiLUbQJJH

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8faa39645a93063dba6029b7375ebecfa6fde50d5343f872041296b4374b1760.exe
    "C:\Users\Admin\AppData\Local\Temp\8faa39645a93063dba6029b7375ebecfa6fde50d5343f872041296b4374b1760.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c wmic cpu get name/value
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:11384
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic cpu get name/value
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:11408
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c wmic Path Win32_DisplayConfiguration get DeviceName/value
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:11488
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic Path Win32_DisplayConfiguration get DeviceName/value
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:11512
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c wmic COMPUTERSYSTEM get TotalPhysicalMemory/value
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:11544
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic COMPUTERSYSTEM get TotalPhysicalMemory/value
        3⤵
        • System Location Discovery: System Language Discovery
        PID:11568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1056-0-0x0000000000400000-0x0000000000873000-memory.dmp

    Filesize

    4.4MB

  • memory/1056-1-0x0000000075910000-0x0000000075957000-memory.dmp

    Filesize

    284KB

  • memory/1056-504-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-503-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-506-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-560-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-508-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-510-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-512-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-514-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-516-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-518-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-520-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-522-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-524-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-526-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-528-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-530-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-532-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-534-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-536-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-538-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-540-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-542-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-544-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-546-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-548-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-550-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-552-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-554-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-556-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-558-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-562-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-564-0x0000000002710000-0x0000000002821000-memory.dmp

    Filesize

    1.1MB

  • memory/1056-2239-0x0000000002580000-0x0000000002701000-memory.dmp

    Filesize

    1.5MB

  • memory/1056-7792-0x0000000000400000-0x0000000000873000-memory.dmp

    Filesize

    4.4MB