Analysis
-
max time kernel
48s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 01:09
Static task
static1
Behavioral task
behavioral1
Sample
61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe
Resource
win10v2004-20240508-en
General
-
Target
61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe
-
Size
2.7MB
-
MD5
ac49aa41a5551500d3b78db56c5ba720
-
SHA1
f97816fdad7521097cbaa2830115aac079d9a6cd
-
SHA256
61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac
-
SHA512
8627ceaa7753247ed52d2884347e212f1ca5c9149710dbbe798d5acccf9c3bd67e31385656ca37f68f065739b045eb973aad41aaabf26f97099c73b6bffb3904
-
SSDEEP
49152:KhBiTCL3IpB+IkhRTWEqfCuXfJ216k4xIURehptc8:KhBiTCL3S+IkhRTWEqfn0FJEehp+8
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exedescription ioc process File opened for modification \??\PhysicalDrive0 61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe -
Modifies registry class 11 IoCs
Processes:
61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5} 61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories 61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\idex = "0fcad63b0cfb75d928a75eeeeed66fcb" 61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\idno = "1" 61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79B5BC47-CEA1-4772-B433-7D1B3139F278}\Implemented Categories\{607568DD-B059-434b-B7E7-38EC51998F8E} 61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0} 61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79B5BC47-CEA1-4772-B433-7D1B3139F278} 61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79B5BC47-CEA1-4772-B433-7D1B3139F278}\Implemented Categories 61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79B5BC47-CEA1-4772-B433-7D1B3139F278}\Implemented Categories\{607568DD-B059-434b-B7E7-38EC51998F8E}\did = "587D27A9BCB5FECD560585DF05BD4F57" 61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exepid process 3540 61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe 3540 61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe 3540 61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe 3540 61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe 3540 61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe -
Suspicious use of SendNotifyMessage 5 IoCs
Processes:
61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exepid process 3540 61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe 3540 61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe 3540 61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe 3540 61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe 3540 61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe"C:\Users\Admin\AppData\Local\Temp\61b587387d7eb0bcd6096ba237b11a1c6932a11aa440123422fe9ea49773c8ac.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\install_res\installconfig.iniFilesize
85B
MD5417603898593dbd933edaff0706b3825
SHA12b1aec0f4d5d6831e90a9af3e8fa4b08fdb64aab
SHA256ffff9a835c2b23185022a7c7cd7022d12dc4dae25e1bea758a5c3737cf1fa722
SHA512fc17686ed27d953b622a6eb62d9345b2c0285998f904ffd8d4a6eef9b71f4a487baa8590da6c9d689bd987da04e15b4e98f463b486246f711f5ba62b56a10306
-
memory/3540-16-0x00000000009F0000-0x00000000009F1000-memory.dmpFilesize
4KB
-
memory/3540-19-0x00000000009F0000-0x00000000009F1000-memory.dmpFilesize
4KB