Analysis
-
max time kernel
85s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 14:10
Static task
static1
Behavioral task
behavioral1
Sample
57c3b73f3d84f2643ec8e9265367c3c2f2c6849bce104c4027e787c2a87c0294.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
57c3b73f3d84f2643ec8e9265367c3c2f2c6849bce104c4027e787c2a87c0294.exe
Resource
win10v2004-20220812-en
General
-
Target
57c3b73f3d84f2643ec8e9265367c3c2f2c6849bce104c4027e787c2a87c0294.exe
-
Size
1.8MB
-
MD5
817d2bfcec7d5b6da82b987b5a6d534f
-
SHA1
e734937d6415f2e6689fa51c88a1f331c7dd2273
-
SHA256
57c3b73f3d84f2643ec8e9265367c3c2f2c6849bce104c4027e787c2a87c0294
-
SHA512
f985ca62b42968f4fc3acad25b704164630cc375d6793bf2b3a59dac8549edc577e75740e00247ff5e73aa1f0e751a62eacfe4f6554407cfe9c1b99129f0cdb0
-
SSDEEP
24576:A3SyKeS+Ck8urp9gBk0bbf2FfWl8KuqGavkg3NyNIbbbIoIBAUZLYi:A3lvS349a/+s8KuqGaX0ToIBAUZLYi
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/728-132-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/728-134-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/728-135-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/728-136-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/728-137-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/728-139-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/728-142-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/728-144-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/728-146-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/728-148-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/728-150-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/728-152-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/728-154-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/728-156-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/728-158-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/728-160-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/728-162-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/728-164-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/728-166-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/728-170-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/728-168-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/728-172-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/728-174-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/728-176-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/728-178-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 57c3b73f3d84f2643ec8e9265367c3c2f2c6849bce104c4027e787c2a87c0294.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 728 57c3b73f3d84f2643ec8e9265367c3c2f2c6849bce104c4027e787c2a87c0294.exe 728 57c3b73f3d84f2643ec8e9265367c3c2f2c6849bce104c4027e787c2a87c0294.exe 728 57c3b73f3d84f2643ec8e9265367c3c2f2c6849bce104c4027e787c2a87c0294.exe 728 57c3b73f3d84f2643ec8e9265367c3c2f2c6849bce104c4027e787c2a87c0294.exe 728 57c3b73f3d84f2643ec8e9265367c3c2f2c6849bce104c4027e787c2a87c0294.exe