Analysis

  • max time kernel
    104s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2025, 18:16

General

  • Target

    eed969a10044ad1db1acc4e18f564ab8066c25bca266b746941085467278132b.exe

  • Size

    10.9MB

  • MD5

    37bf9401cb3f3877b5651a65522664e1

  • SHA1

    822cd1ed31d59e7d7f2702b5ae8644008f7746d6

  • SHA256

    eed969a10044ad1db1acc4e18f564ab8066c25bca266b746941085467278132b

  • SHA512

    8752d64a34a762d0ba3041e18045b3a84266cbdca9e7420c4e30117e4f3c15393cd3af2d07398a3863698d1d878e9a8cfeebd26139a555fc95f2bbf66edfe381

  • SSDEEP

    196608:ArgKt+dKzq4VzdtsMgqS8/1a9Q1NlCURZkTG4XIpWl+UycjfOYfAH4/C:EgKtQB4V+8/1HtCYZkT40l+UlykAHD

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\eed969a10044ad1db1acc4e18f564ab8066c25bca266b746941085467278132b.exe
    "C:\Users\Admin\AppData\Local\Temp\eed969a10044ad1db1acc4e18f564ab8066c25bca266b746941085467278132b.exe"
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:5820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\{793871C9-806D-4045-B159-8B21CD5DAAE6}.tmp\7z.dll

    Filesize

    1.1MB

    MD5

    fd7d1c37b3a69de832fea99974284540

    SHA1

    f37c21cc58f91435e0395c8d634e59eb7658f5ba

    SHA256

    565e334945530ed6ea932fd728d55d71ee757d654eec558391c9e3ccf7861fcc

    SHA512

    14b4f3c943f79d00d6b17c7d3a4654648874342eed5f6b765c1f821eefd116f7d1cb631ad363f71fe240bb53142a7c6340ee094a5527f69d67c3e1ab1c76eb0d