Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 12:54
Static task
static1
Behavioral task
behavioral1
Sample
5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe
Resource
win10v2004-20220812-en
General
-
Target
5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe
-
Size
727KB
-
MD5
0c3fbb0c1483737752ac07d65a807eb0
-
SHA1
a2448905040cde015afbce6d0875f2d0b47ca272
-
SHA256
5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04
-
SHA512
f4a09216d83ea2536aec7a31ad623170f5d8bbfcb54bbbb915bb99e519984bee9c8061e7163f74907e44423d204ff2926fd5989084443dea5de2db1961c146cb
-
SSDEEP
12288:rwECaUglPnFsk7P0UahDyDT1qBRXjIjpitNxpJ:rwEC70qkgUahDuER1NJ
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\w: 5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe File opened (read-only) \??\y: 5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe File opened (read-only) \??\g: 5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe File opened (read-only) \??\i: 5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe File opened (read-only) \??\k: 5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe File opened (read-only) \??\o: 5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe File opened (read-only) \??\s: 5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe File opened (read-only) \??\t: 5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe File opened (read-only) \??\h: 5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe File opened (read-only) \??\p: 5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe File opened (read-only) \??\q: 5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe File opened (read-only) \??\x: 5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe File opened (read-only) \??\z: 5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe File opened (read-only) \??\e: 5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe File opened (read-only) \??\j: 5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe File opened (read-only) \??\m: 5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe File opened (read-only) \??\n: 5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe File opened (read-only) \??\u: 5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe File opened (read-only) \??\v: 5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe File opened (read-only) \??\f: 5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe File opened (read-only) \??\l: 5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe File opened (read-only) \??\r: 5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe