Analysis
-
max time kernel
151s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 09:31
Behavioral task
behavioral1
Sample
fsMon.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fsMon.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
սʬʬɱV2.2.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
սʬʬɱV2.2.exe
Resource
win10v2004-20220901-en
General
-
Target
սʬʬɱV2.2.exe
-
Size
829KB
-
MD5
e0a867c1368e0a0f7cee9f9304826945
-
SHA1
f179c0b49d3d3705d99697702ac5383ba018f30a
-
SHA256
c8b846efff2b4e197a98be1a4dc35117725ee905c0f5b7e22c87183ce67f6dbe
-
SHA512
ebee0a2f4ad1ee3b042befeb6f5351293fe7c376c2686c7ba0e2de9f5411532f20d0e9886c2254389b5cb51a1dcd75da56d1f61d78bbfe02239ec91fcb5c780e
-
SSDEEP
24576:Un+GIgqdJeXo7joesIeXE2zp8jvJUKGU99o:7OqdMXcTslE2zpSqKGUv
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral3/memory/1524-54-0x0000000000400000-0x0000000000CAF000-memory.dmp upx behavioral3/memory/1524-56-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1524-58-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1524-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1524-62-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1524-64-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1524-60-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1524-68-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1524-66-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1524-70-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1524-72-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1524-74-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1524-76-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1524-78-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1524-80-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1524-82-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1524-84-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1524-86-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1524-89-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1524-91-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1524-95-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1524-93-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1524-99-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1524-97-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral3/memory/1524-100-0x0000000000400000-0x0000000000CAF000-memory.dmp upx behavioral3/memory/1524-101-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
սʬʬɱV2.2.exedescription ioc process File opened for modification \??\PhysicalDrive0 սʬʬɱV2.2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
սʬʬɱV2.2.exedescription pid process Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe Token: 33 1524 սʬʬɱV2.2.exe Token: SeIncBasePriorityPrivilege 1524 սʬʬɱV2.2.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
սʬʬɱV2.2.exepid process 1524 սʬʬɱV2.2.exe 1524 սʬʬɱV2.2.exe 1524 սʬʬɱV2.2.exe 1524 սʬʬɱV2.2.exe