Analysis

  • max time kernel
    140s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 06:09

General

  • Target

    U89.exe

  • Size

    212KB

  • MD5

    f556271e1338dfc224cbebf6fe8f8eae

  • SHA1

    054f755a4037ba3bc4c17a5f4c681a1204f35e0d

  • SHA256

    a70560275b6f6e9586a30f473b01f2584717df66a338204c696b55aa9994ca59

  • SHA512

    5f6c89c1544110d4039b4d814618f18ffd341c1c057ea9837006ab858187164e9d8f2910cdd133696a20bdbe2a2fb351b7c0e8c4d02693cd436ab7a88e7915d0

  • SSDEEP

    3072:obhW6ZNK8kxbvM6qVYqQyYOmaq63Ckl+GPDJNn6lsJ9t57OGskwuZ53lWQMEdFFH:o8c18vM64LYOmaq6TIS6lyX7Tp/1Zv

Malware Config

Signatures

  • Unexpected DNS network traffic destination 11 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\U89.exe
    "C:\Users\Admin\AppData\Local\Temp\U89.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:2104

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\PUTTY.RND

          Filesize

          600B

          MD5

          ca2061fac79d5c50e7f7475e8922d0e0

          SHA1

          6a0d0627e0fb1478e4c0bf05e31a39715b00b8f2

          SHA256

          3a61bd5b54064b53e985c644df8f2dfc5e27b2299164bf45bc56540c0b2582ac

          SHA512

          8e30f669c53f15a5190fafa6a326fe8ee871713ef1b51154fc74501960fe36b03f4a2d15ae1351b786ccdbc6b6ef98b6b374310121c387dc671a38b3af8722ca

        • memory/2104-0-0x0000000000400000-0x0000000000465000-memory.dmp

          Filesize

          404KB

        • memory/2104-3-0x0000000000400000-0x0000000000465000-memory.dmp

          Filesize

          404KB

        • memory/2104-4-0x0000000000400000-0x0000000000465000-memory.dmp

          Filesize

          404KB

        • memory/2104-14-0x0000000000400000-0x0000000000465000-memory.dmp

          Filesize

          404KB

        • memory/2104-26-0x0000000000400000-0x0000000000465000-memory.dmp

          Filesize

          404KB

        • memory/2104-27-0x0000000000400000-0x0000000000465000-memory.dmp

          Filesize

          404KB

        • memory/2104-34-0x0000000000400000-0x0000000000465000-memory.dmp

          Filesize

          404KB

        • memory/2104-35-0x0000000000400000-0x0000000000465000-memory.dmp

          Filesize

          404KB

        • memory/2104-42-0x0000000000400000-0x0000000000465000-memory.dmp

          Filesize

          404KB