Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 10:55
Static task
static1
Behavioral task
behavioral1
Sample
HD.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
HD.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$TEMP/{tmp}/HDTunePro.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$TEMP/{tmp}/HDTunePro.exe
Resource
win10v2004-20240802-en
General
-
Target
HD.exe
-
Size
823KB
-
MD5
814cba52bcc8cdd3405c18b867c3d7fb
-
SHA1
b2850b23609641eaa564f122c66515ffa9ea470a
-
SHA256
1b9718d5826acaa26e0529ad2617e32fe712d6f19d6bdd6e0cea5f755516c319
-
SHA512
b3fa116c0376beb0de34189b31d8f8c16e2b435ee578d79145c5b96fcea5fbba6226e90d6202e658173ced216eb558a8cd787c90023193d2d4d4673e4c8ea298
-
SSDEEP
12288:jPGAAoiHUuGx86EcuswBjWagpTdEse8bjGld4VnlOixp:VGcx86yiawdEseiiop
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1976 HDTunePro.exe -
Loads dropped DLL 3 IoCs
pid Process 1960 HD.exe 1976 HDTunePro.exe 1976 HDTunePro.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: HDTunePro.exe File opened (read-only) \??\J: HDTunePro.exe File opened (read-only) \??\P: HDTunePro.exe File opened (read-only) \??\R: HDTunePro.exe File opened (read-only) \??\U: HDTunePro.exe File opened (read-only) \??\V: HDTunePro.exe File opened (read-only) \??\X: HDTunePro.exe File opened (read-only) \??\Y: HDTunePro.exe File opened (read-only) \??\A: HDTunePro.exe File opened (read-only) \??\B: HDTunePro.exe File opened (read-only) \??\E: HDTunePro.exe File opened (read-only) \??\F: HDTunePro.exe File opened (read-only) \??\N: HDTunePro.exe File opened (read-only) \??\Q: HDTunePro.exe File opened (read-only) \??\W: HDTunePro.exe File opened (read-only) \??\D: HDTunePro.exe File opened (read-only) \??\K: HDTunePro.exe File opened (read-only) \??\M: HDTunePro.exe File opened (read-only) \??\O: HDTunePro.exe File opened (read-only) \??\G: HDTunePro.exe File opened (read-only) \??\I: HDTunePro.exe File opened (read-only) \??\L: HDTunePro.exe File opened (read-only) \??\S: HDTunePro.exe File opened (read-only) \??\T: HDTunePro.exe File opened (read-only) \??\Z: HDTunePro.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 HDTunePro.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegEdit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HDTunePro.exe -
Runs .reg file with regedit 1 IoCs
pid Process 2484 RegEdit.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1976 HDTunePro.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1976 HDTunePro.exe 1976 HDTunePro.exe 1976 HDTunePro.exe 1976 HDTunePro.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1976 HDTunePro.exe 1976 HDTunePro.exe 1976 HDTunePro.exe 1976 HDTunePro.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1976 HDTunePro.exe 1976 HDTunePro.exe 1976 HDTunePro.exe 1976 HDTunePro.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2484 1960 HD.exe 30 PID 1960 wrote to memory of 2484 1960 HD.exe 30 PID 1960 wrote to memory of 2484 1960 HD.exe 30 PID 1960 wrote to memory of 2484 1960 HD.exe 30 PID 1960 wrote to memory of 2484 1960 HD.exe 30 PID 1960 wrote to memory of 2484 1960 HD.exe 30 PID 1960 wrote to memory of 2484 1960 HD.exe 30 PID 1960 wrote to memory of 1976 1960 HD.exe 31 PID 1960 wrote to memory of 1976 1960 HD.exe 31 PID 1960 wrote to memory of 1976 1960 HD.exe 31 PID 1960 wrote to memory of 1976 1960 HD.exe 31 PID 1960 wrote to memory of 1976 1960 HD.exe 31 PID 1960 wrote to memory of 1976 1960 HD.exe 31 PID 1960 wrote to memory of 1976 1960 HD.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\HD.exe"C:\Users\Admin\AppData\Local\Temp\HD.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\RegEdit.exeRegEdit /S C:\Users\Admin\AppData\Local\Temp\{tmp}\HDTunePro.reg2⤵
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2484
-
-
C:\Users\Admin\AppData\Local\Temp\{tmp}\HDTunePro.exeC:\Users\Admin\AppData\Local\Temp\{tmp}\HDTunePro.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD573db802896ac1ed656081b2e72f04ea4
SHA19d44b78665caa9adfd7dcb743bfe55a02d0b1c2b
SHA2563dac8ea4621b74f5fed03af283c475b9448a27a650226798b1ee5421e1442e78
SHA5127523207bb96e75f486326baaf9a917452f206d8ceb0e76516d8be2639c8a97572d85e14c512179966f52544d6e95c996a5098a0310df447c6e15f4a77c9dd290
-
Filesize
718KB
MD5a89e2c78e6dad4b81e8a1884c1e95716
SHA1813f3c1711ad8cb2f4ea7ab62a1c26d4c744cd74
SHA256acc68f63823435d26d17724ef073e6941eaebc5c7f80edc04b2063c619c510af
SHA512c4446e0bbecf073921fda2c48ae8b1cab7e9f1549b4fdbcc4a2e70e5c2a50cf09a4f439831a9f1333e8c96a8a650772fbde8676c0e88e24a9bf53e64d6c67a88