Analysis
-
max time kernel
48s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 14:08
Behavioral task
behavioral1
Sample
b60af774f94d5bc34f67a5e6c11685093d1fecdff994dd735d7a2ee32168d48a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b60af774f94d5bc34f67a5e6c11685093d1fecdff994dd735d7a2ee32168d48a.exe
Resource
win10v2004-20221111-en
General
-
Target
b60af774f94d5bc34f67a5e6c11685093d1fecdff994dd735d7a2ee32168d48a.exe
-
Size
964KB
-
MD5
26b420e6a13ff5154983c26a5b7da412
-
SHA1
79b2d064918b4f97afd02f71e4b5e197cc818827
-
SHA256
b60af774f94d5bc34f67a5e6c11685093d1fecdff994dd735d7a2ee32168d48a
-
SHA512
38f0fc84f9cbce06109606ad631ab43167d6c07901e9e4f8260cd3ae1840eaae2e8758bbf4f4852e5c9baad766867084d43d0f5c632263ff2d7aaf901ee9d96d
-
SSDEEP
24576:TCHKRkjHIgjvTDfh7zR3L/CSbub7V2C2S6tfm:GHvjogDZ7l3Lqiu3/R2
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1168-55-0x0000000000400000-0x00000000006DD000-memory.dmp vmprotect behavioral1/memory/1168-62-0x0000000000400000-0x00000000006DD000-memory.dmp vmprotect behavioral1/memory/1168-63-0x0000000000400000-0x00000000006DD000-memory.dmp vmprotect behavioral1/memory/1168-69-0x0000000000400000-0x00000000006DD000-memory.dmp vmprotect -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
b60af774f94d5bc34f67a5e6c11685093d1fecdff994dd735d7a2ee32168d48a.exedescription ioc process File opened for modification \??\PhysicalDrive0 b60af774f94d5bc34f67a5e6c11685093d1fecdff994dd735d7a2ee32168d48a.exe -
Drops file in Windows directory 2 IoCs
Processes:
b60af774f94d5bc34f67a5e6c11685093d1fecdff994dd735d7a2ee32168d48a.exedescription ioc process File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe b60af774f94d5bc34f67a5e6c11685093d1fecdff994dd735d7a2ee32168d48a.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\sc_reader.exe b60af774f94d5bc34f67a5e6c11685093d1fecdff994dd735d7a2ee32168d48a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
b60af774f94d5bc34f67a5e6c11685093d1fecdff994dd735d7a2ee32168d48a.exepid process 1168 b60af774f94d5bc34f67a5e6c11685093d1fecdff994dd735d7a2ee32168d48a.exe 1168 b60af774f94d5bc34f67a5e6c11685093d1fecdff994dd735d7a2ee32168d48a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b60af774f94d5bc34f67a5e6c11685093d1fecdff994dd735d7a2ee32168d48a.exedescription pid process Token: SeDebugPrivilege 1168 b60af774f94d5bc34f67a5e6c11685093d1fecdff994dd735d7a2ee32168d48a.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
b60af774f94d5bc34f67a5e6c11685093d1fecdff994dd735d7a2ee32168d48a.exepid process 1168 b60af774f94d5bc34f67a5e6c11685093d1fecdff994dd735d7a2ee32168d48a.exe 1168 b60af774f94d5bc34f67a5e6c11685093d1fecdff994dd735d7a2ee32168d48a.exe 1168 b60af774f94d5bc34f67a5e6c11685093d1fecdff994dd735d7a2ee32168d48a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b60af774f94d5bc34f67a5e6c11685093d1fecdff994dd735d7a2ee32168d48a.exe"C:\Users\Admin\AppData\Local\Temp\b60af774f94d5bc34f67a5e6c11685093d1fecdff994dd735d7a2ee32168d48a.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1168