Analysis
-
max time kernel
403s -
max time network
440s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 22:16
Behavioral task
behavioral1
Sample
81afac513dcc864752c21469a744edd1f55f23a329e6e20942956c604ba58475.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
81afac513dcc864752c21469a744edd1f55f23a329e6e20942956c604ba58475.exe
Resource
win10v2004-20221111-en
General
-
Target
81afac513dcc864752c21469a744edd1f55f23a329e6e20942956c604ba58475.exe
-
Size
722KB
-
MD5
d7a655cddad5967c46cb20098ae982a4
-
SHA1
21c517c7036ef0cbc4fb36e395b485e10480aa0a
-
SHA256
81afac513dcc864752c21469a744edd1f55f23a329e6e20942956c604ba58475
-
SHA512
5da149b2c402a80aa4028c5e2bd77e17818baa19dbdea6b26f5ce6f903196e0c5436a3eafc9d5889d04901ece176dd1447a1fbe1623c37e734bf4ebe7fe35fb4
-
SSDEEP
12288:fYtMSqwROzzSOqzJUdw4q3JM+RrhYWOzXcVS3BGvEKWAhkniJr:AtrO4UKnLWzsVS3oz7hs0
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 81afac513dcc864752c21469a744edd1f55f23a329e6e20942956c604ba58475.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2932 81afac513dcc864752c21469a744edd1f55f23a329e6e20942956c604ba58475.exe 2932 81afac513dcc864752c21469a744edd1f55f23a329e6e20942956c604ba58475.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2932 81afac513dcc864752c21469a744edd1f55f23a329e6e20942956c604ba58475.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2932 81afac513dcc864752c21469a744edd1f55f23a329e6e20942956c604ba58475.exe 2932 81afac513dcc864752c21469a744edd1f55f23a329e6e20942956c604ba58475.exe 2932 81afac513dcc864752c21469a744edd1f55f23a329e6e20942956c604ba58475.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\81afac513dcc864752c21469a744edd1f55f23a329e6e20942956c604ba58475.exe"C:\Users\Admin\AppData\Local\Temp\81afac513dcc864752c21469a744edd1f55f23a329e6e20942956c604ba58475.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2932