Task
task1
Sample
8b077ae5dc7f9546bca05fb992f710633571e191758077933c547537f4eaa4d8.exe
Resource
win7v191014
0 signatures
Task
task2
Sample
8b077ae5dc7f9546bca05fb992f710633571e191758077933c547537f4eaa4d8.exe
Resource
win10v191014
0 signatures
General
-
Target
8b077ae5dc7f9546bca05fb992f710633571e191758077933c547537f4eaa4d8
-
Sample
191025-gwmgecpxns
-
SHA256
8b077ae5dc7f9546bca05fb992f710633571e191758077933c547537f4eaa4d8
Score
N/A
Malware Config
Signatures
-
Accessing to Master Boot Record (MBR) 1 TTPs 1 IoCs
description ioc pid Process File opened for modification \??\PHYSICALDRIVE0 1272 8b077ae5dc7f9546bca05fb992f710633571e191758077933c547537f4eaa4d8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1272 8b077ae5dc7f9546bca05fb992f710633571e191758077933c547537f4eaa4d8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b077ae5dc7f9546bca05fb992f710633571e191758077933c547537f4eaa4d8.exe"C:\Users\Admin\AppData\Local\Temp\8b077ae5dc7f9546bca05fb992f710633571e191758077933c547537f4eaa4d8.exe"1⤵
- Accessing to Master Boot Record (MBR)
- Suspicious use of AdjustPrivilegeToken
PID:1272
Network
MITRE ATT&CK Additional techniques
- T1067