Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 04:09
Static task
static1
Behavioral task
behavioral1
Sample
f42fa144980d61c6f1832c8aa8c0337a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f42fa144980d61c6f1832c8aa8c0337a.exe
Resource
win10v2004-20240611-en
General
-
Target
f42fa144980d61c6f1832c8aa8c0337a.exe
-
Size
42.4MB
-
MD5
f42fa144980d61c6f1832c8aa8c0337a
-
SHA1
c96f32a3e446d6ce87fafc01366cdd2c819528e7
-
SHA256
46cb0bfebca7f8171307b390923ee779eafa2a2e8d000f7ea5e64653eadede5e
-
SHA512
ee7f36eee7d07057e6b9e2576adef4ce6e0dba10231c877c09293ac5c5be35423c95a2c232e880c9733fff7576d4c039a257099b819d5d9d2adc5086ff44a30a
-
SSDEEP
786432:9wYnIe84d7m8/Mw5CaXv2S3IPlv5OqlICX1atGLJcez+yzqFqikJaaZRTdcHj:9wYn7dX/uyv28Id5PlIQk0qeyOq8DrRo
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
f42fa144980d61c6f1832c8aa8c0337a.exepid process 2880 f42fa144980d61c6f1832c8aa8c0337a.exe 2880 f42fa144980d61c6f1832c8aa8c0337a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
f42fa144980d61c6f1832c8aa8c0337a.exedescription ioc process File opened for modification \??\PhysicalDrive0 f42fa144980d61c6f1832c8aa8c0337a.exe -
Drops file in Program Files directory 2 IoCs
Processes:
f42fa144980d61c6f1832c8aa8c0337a.exedescription ioc process File created C:\Program Files (x86)\LuDaShi\{022CBB75-D168-40a6-AD50-DDC2AD2787A2}.tf f42fa144980d61c6f1832c8aa8c0337a.exe File created C:\Program Files (x86)\LuDaShi\{F7F2C52B-0F7D-4d52-902C-58CDF3EC1004}.tmp\{7E0CA564-3B0B-457e-97D4-72E615E61F7B}.tf f42fa144980d61c6f1832c8aa8c0337a.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2748 2880 WerFault.exe f42fa144980d61c6f1832c8aa8c0337a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
f42fa144980d61c6f1832c8aa8c0337a.exedescription pid process target process PID 2880 wrote to memory of 2748 2880 f42fa144980d61c6f1832c8aa8c0337a.exe WerFault.exe PID 2880 wrote to memory of 2748 2880 f42fa144980d61c6f1832c8aa8c0337a.exe WerFault.exe PID 2880 wrote to memory of 2748 2880 f42fa144980d61c6f1832c8aa8c0337a.exe WerFault.exe PID 2880 wrote to memory of 2748 2880 f42fa144980d61c6f1832c8aa8c0337a.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f42fa144980d61c6f1832c8aa8c0337a.exe"C:\Users\Admin\AppData\Local\Temp\f42fa144980d61c6f1832c8aa8c0337a.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 9882⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\lds_setup.logFilesize
1014B
MD53d59e283eb7d2122cd7c93059c35262a
SHA169eb2c3726c7c3979a56345003adf01a5dcaae5d
SHA256cf19042981a61b62103253be179786bc72c0df767ff07c0ce4ae6364dffd56b6
SHA51294e4e6f678868e68433ccb526fbfcd0a90477cde17c066021427f5d9b80124dc753096d18e3feca8a81aff36312c36127af0da188b95a30a7cbf32313f07f493
-
\Users\Admin\AppData\Local\Temp\{381024D3-4FC7-4f32-A773-6761A613B04C}.tmp\NetBridge.dllFilesize
231KB
MD59d145902fb5b9a6da62ac85761434e31
SHA1c817d77f59e3767d75cf5f5298d6b5711308f7e5
SHA25698d795d55329b1057f4fd590468e648a8c34b620207fd9a0a6953f3e98d1ea43
SHA512bbb3109bcd5ded909bfdaeb7f4f006fc5928a9bc501bad5ae8ba9805bc0d924a2c4da8bbd215480db936d663852abd9b0435fa241a40224a4cd93c4b7aff79a9
-
\Users\Admin\AppData\Local\Temp\{61FF7A75-7089-461f-840A-F15DA15AA247}.tmp\7z.dllFilesize
1.1MB
MD52888126384d873cc49af32bbe34bb296
SHA1fe74877bcaec93c7d67dab2ce8c86cfc38402d22
SHA256aba19501a8033495664879e09e60e4788537d387cf038fa8769e5b178bccdcb4
SHA512f283b721b27d85fbc7a4e1e91ab1683da0c3888f632873625c4c2b48caa170471aaa84e107230988f615d3f43e40a640607d6e6f641aed59788dee441801748a
-
memory/2880-40-0x00000000006D0000-0x00000000006D1000-memory.dmpFilesize
4KB