Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/02/2025, 06:53

General

  • Target

    f77f9164b861fd934d352eebf6cd5a1d92446d5d4f80b5b9a3445774a96d5f66.exe

  • Size

    3.8MB

  • MD5

    239b5f9cce3103a7824bc78b9b86e211

  • SHA1

    1c2d96f1b3d3c96d30eaacd1b9be41b29f6b1fac

  • SHA256

    f77f9164b861fd934d352eebf6cd5a1d92446d5d4f80b5b9a3445774a96d5f66

  • SHA512

    5ac7ed1a2ef23fb1230e33e6e29226cdc17ac57ce01510041ec1cfe9f2bf66a527fad7d433798b7f29827a572b9f2ab17cea4aa1ee65e5fb173a9f572c56a0f9

  • SSDEEP

    98304:kEjlmQbfgSgwvSnN4iVJu+0xGZ6twFquI3rFqz:kEjgQPXqdEtwYf3rFqz

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f77f9164b861fd934d352eebf6cd5a1d92446d5d4f80b5b9a3445774a96d5f66.exe
    "C:\Users\Admin\AppData\Local\Temp\f77f9164b861fd934d352eebf6cd5a1d92446d5d4f80b5b9a3445774a96d5f66.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Writes to the Master Boot Record (MBR)
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Tencent\TxGameAssistant\TGBDownloader\dr.dll

    Filesize

    74KB

    MD5

    2814acbd607ba47bdbcdf6ac3076ee95

    SHA1

    50ab892071bed2bb2365ca1d4bf5594e71c6b13b

    SHA256

    5904a7e4d97eeac939662c3638a0e145f64ff3dd0198f895c4bf0337595c6a67

    SHA512

    34c73014ffc8d38d6dd29f4f84c8f4f9ea971bc131f665f65b277f453504d5efc2d483a792cdea610c5e0544bf3997b132dcdbe37224912c5234c15cdb89d498