Analysis
-
max time kernel
152s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 17:46
Behavioral task
behavioral1
Sample
0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04.exe
Resource
win10v2004-20220812-en
General
-
Target
0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04.exe
-
Size
535KB
-
MD5
06c74d7f8d9a6972866e757c4ef7e8db
-
SHA1
8c7f9be20b4e88ee6d06db2968a0e09b0842e6cc
-
SHA256
0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04
-
SHA512
8fc3bffdfd34c352f5735a03f482653522668b08fd19666af5a1c9393f311ea7872163964e296b995c4f13eeb4873f82085dc68574923d19285705153040f283
-
SSDEEP
12288:hHOpBMKvN3cv2+rMQFDn7ezsDz0pzDJZNS:xOjrsvLvx7ezsDApz9Z0
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4404-132-0x0000000000400000-0x0000000000487000-memory.dmp upx behavioral2/memory/4404-133-0x0000000000400000-0x0000000000487000-memory.dmp upx -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: 0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04.exe File opened (read-only) \??\i: 0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04.exe File opened (read-only) \??\j: 0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04.exe File opened (read-only) \??\k: 0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04.exe File opened (read-only) \??\q: 0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04.exe File opened (read-only) \??\f: 0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04.exe File opened (read-only) \??\g: 0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04.exe File opened (read-only) \??\h: 0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04.exe File opened (read-only) \??\m: 0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04.exe File opened (read-only) \??\v: 0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04.exe File opened (read-only) \??\z: 0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04.exe File opened (read-only) \??\p: 0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04.exe File opened (read-only) \??\u: 0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04.exe File opened (read-only) \??\w: 0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04.exe File opened (read-only) \??\l: 0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04.exe File opened (read-only) \??\n: 0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04.exe File opened (read-only) \??\o: 0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04.exe File opened (read-only) \??\r: 0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04.exe File opened (read-only) \??\s: 0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04.exe File opened (read-only) \??\t: 0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04.exe File opened (read-only) \??\x: 0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04.exe File opened (read-only) \??\y: 0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 0f9aa3f758df21afa0934e19ce6c2285fb2c890f39b280f19c955c140b3e5e04.exe