Analysis
-
max time kernel
126s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2023 18:28
Static task
static1
Behavioral task
behavioral1
Sample
512897788077149d32022933ed419e17af55373f395959916507e3d039a1b2f1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
512897788077149d32022933ed419e17af55373f395959916507e3d039a1b2f1.exe
Resource
win10v2004-20221111-en
General
-
Target
512897788077149d32022933ed419e17af55373f395959916507e3d039a1b2f1.exe
-
Size
4.5MB
-
MD5
4aec7b439eb03cf80d7d39ac5d294958
-
SHA1
b7e4e7f1f201df01165ad3b8e353d6c1c59a48d1
-
SHA256
512897788077149d32022933ed419e17af55373f395959916507e3d039a1b2f1
-
SHA512
76d726f8f3d2188e134f91f085480c8e5165539f6515484030ee4d18f8737efe22cb326b50266018fd099076572492fa3af0145be1a8f98ae1a3229cec0d8cf9
-
SSDEEP
49152:yJjY7skZyOVQrjpXTmzdLpMXeXezUYt0cdoaU5Ia6EywUPdAT0c0YwcLivKzyGYC:aj0PVQXpSdFMXeXezYcdCh9tTLTwpFGT
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 512897788077149d32022933ed419e17af55373f395959916507e3d039a1b2f1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1260 512897788077149d32022933ed419e17af55373f395959916507e3d039a1b2f1.exe 1260 512897788077149d32022933ed419e17af55373f395959916507e3d039a1b2f1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1260 512897788077149d32022933ed419e17af55373f395959916507e3d039a1b2f1.exe 1260 512897788077149d32022933ed419e17af55373f395959916507e3d039a1b2f1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\512897788077149d32022933ed419e17af55373f395959916507e3d039a1b2f1.exe"C:\Users\Admin\AppData\Local\Temp\512897788077149d32022933ed419e17af55373f395959916507e3d039a1b2f1.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1260