Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 07:44
Static task
static1
Behavioral task
behavioral1
Sample
css/1.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
css/1.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
css/2.bat
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
css/2.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
css/d.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
css/d.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
css/goto.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
css/goto.exe
Resource
win10v2004-20241007-en
General
-
Target
css/goto.exe
-
Size
2.6MB
-
MD5
5d994ed0be59ab5f2f0242706b8b3b55
-
SHA1
b7787d1050691e9dbc5ef6dadc80c36761ae9697
-
SHA256
74533489c6609b07b00e578d98af29dd6250ddd800e5ecf5743cd9af2e2f24f3
-
SHA512
86c9e160b7b9015c790254857526aa554a020888383638eb4787a4f700b299cd16e26c08e4dac823be8832274eb3bc74421932e9bb880e44062053fc49f1de27
-
SSDEEP
49152:dJp9NvSqm1wFE5eBe0/4tmsHfK99IvS0mmvQDTGJt0P:AqsevwIN9Wn0
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 goto.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2396 goto.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2396 goto.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2396 goto.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2396 2524 goto.exe 31 PID 2524 wrote to memory of 2396 2524 goto.exe 31 PID 2524 wrote to memory of 2396 2524 goto.exe 31 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System goto.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\SoftwareSASGeneration = "1" goto.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\css\goto.exe"C:\Users\Admin\AppData\Local\Temp\css\goto.exe"1⤵
- System policy modification
PID:2528
-
C:\Users\Admin\AppData\Local\Temp\css\goto.exe"C:\Users\Admin\AppData\Local\Temp\css\goto.exe" service1⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\css\goto.exe"C:\Users\Admin\AppData\Local\Temp\css\goto.exe" Global\GotoHTTP_12⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD54d93c6c5ad3adfcfa6103c6538d4df5d
SHA1206de1901a824c7dca668bfc09187a875115ed5b
SHA256dce530b2e9c60b681280f6623af320de4b31812d3e5de39203c6234d021dd787
SHA51234a7f28ce28aeb27227b0f851a94cc7ba3317b5bc7927970cb405833ed6d0cdbb2678606c00ecaf00579bf6471986d169dcdea0b2788a4f9cbf5a1b9304bb192