Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 02:26
Static task
static1
Behavioral task
behavioral1
Sample
ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exe
Resource
win10v2004-20220812-en
General
-
Target
ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exe
-
Size
1.2MB
-
MD5
6b0979d7f502e704b0d143507892127a
-
SHA1
3ddf922e4391b8b37656d530d90ac3808120f3df
-
SHA256
ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028
-
SHA512
0633d71ddd4134a63b7f7d7eb5508cb48815656bdf291baac3e0ff7df60f07f01aad723837e284181b061a374a8fbc06d64a62147250300e83b544a467df0368
-
SSDEEP
24576:j9bnp6KVuOvEYFNbYxC8ikOqKJP5EsC1fK8oiZ6XBIogtRd3NUxWd:D6K+iN8ikOhvY1fGK6XBIogLd3+Wd
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exedescription ioc process File opened for modification \??\PhysicalDrive0 ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exepid process 4612 ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exe 4612 ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exe 4612 ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exe 4612 ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exe 4612 ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exe 4612 ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exe 4612 ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exe 4612 ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exe 4612 ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exe 4612 ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exe 4612 ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exe 4612 ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exepid process 4612 ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exe 4612 ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exe"C:\Users\Admin\AppData\Local\Temp\ac13dc732c54140b112038211cb9050cedc9918419164748b663d4101ad6b028.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4612