Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 07:44
Static task
static1
Behavioral task
behavioral1
Sample
css/1.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
css/1.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
css/2.bat
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
css/2.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
css/d.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
css/d.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
css/goto.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
css/goto.exe
Resource
win10v2004-20241007-en
General
-
Target
css/goto.exe
-
Size
2.6MB
-
MD5
5d994ed0be59ab5f2f0242706b8b3b55
-
SHA1
b7787d1050691e9dbc5ef6dadc80c36761ae9697
-
SHA256
74533489c6609b07b00e578d98af29dd6250ddd800e5ecf5743cd9af2e2f24f3
-
SHA512
86c9e160b7b9015c790254857526aa554a020888383638eb4787a4f700b299cd16e26c08e4dac823be8832274eb3bc74421932e9bb880e44062053fc49f1de27
-
SSDEEP
49152:dJp9NvSqm1wFE5eBe0/4tmsHfK99IvS0mmvQDTGJt0P:AqsevwIN9Wn0
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 goto.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4668 goto.exe 4668 goto.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4668 goto.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4668 goto.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4960 wrote to memory of 4668 4960 goto.exe 84 PID 4960 wrote to memory of 4668 4960 goto.exe 84 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System goto.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\SoftwareSASGeneration = "1" goto.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\css\goto.exe"C:\Users\Admin\AppData\Local\Temp\css\goto.exe"1⤵
- System policy modification
PID:1804
-
C:\Users\Admin\AppData\Local\Temp\css\goto.exe"C:\Users\Admin\AppData\Local\Temp\css\goto.exe" service1⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\css\goto.exe"C:\Users\Admin\AppData\Local\Temp\css\goto.exe" Global\GotoHTTP_12⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD599ac68f1629e4dd627bd56fba97d3bc7
SHA175f51e2c35f970568bf1786eb773cc8581011d98
SHA2568029246632f7761611a50738e621ed2341390a3c7a18631b021a48aac65bc3d9
SHA512398121a44e5cc7105a302a068a69e60b86e7499ab49f828d5f8c07bdb0b2177cdf6f828224be691460bea0f2a419e16db6db3ee95e8758ce3fe9c0e85e52f0e2