Analysis
-
max time kernel
91s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2022 17:57
Static task
static1
Behavioral task
behavioral1
Sample
f34f8582e275f808ff5fdc612251ed177f745910d0a3e222559df4f9f34876e1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f34f8582e275f808ff5fdc612251ed177f745910d0a3e222559df4f9f34876e1.exe
Resource
win10v2004-20220812-en
General
-
Target
f34f8582e275f808ff5fdc612251ed177f745910d0a3e222559df4f9f34876e1.exe
-
Size
181KB
-
MD5
0ab5d2689033d7e8da59b325bacfdb86
-
SHA1
6030169127802e24b23956f05f76e7f37c06b92d
-
SHA256
f34f8582e275f808ff5fdc612251ed177f745910d0a3e222559df4f9f34876e1
-
SHA512
444c68a21a18a42b2e6e92346b8e370d717b9e2963768324ebd2dfd43d562eceeb531c946c2b04b8532f0ca9e39b5b1e0a6e4f9879f402513e95e6bb66d0c15b
-
SSDEEP
3072:bBfjkvrLgfthhZDZpL8nBwXsWM9csOV4td/+920bIiUJq:JkshNSnBwXnM9I2t4920bmq
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\physicaldrive0 f34f8582e275f808ff5fdc612251ed177f745910d0a3e222559df4f9f34876e1.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1188 f34f8582e275f808ff5fdc612251ed177f745910d0a3e222559df4f9f34876e1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1188 f34f8582e275f808ff5fdc612251ed177f745910d0a3e222559df4f9f34876e1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f34f8582e275f808ff5fdc612251ed177f745910d0a3e222559df4f9f34876e1.exe"C:\Users\Admin\AppData\Local\Temp\f34f8582e275f808ff5fdc612251ed177f745910d0a3e222559df4f9f34876e1.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:1188