Analysis
-
max time kernel
90s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2023 12:35
Behavioral task
behavioral1
Sample
ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe
Resource
win10v2004-20221111-en
General
-
Target
ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe
-
Size
537KB
-
MD5
99ae89d49036c0e2f934339510c68bea
-
SHA1
b05fe3112ff3b29aca6b510cb093094ad10011d4
-
SHA256
ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061
-
SHA512
7a6c48ab4a1894a6712bc337d356f984a38e18f4005bd259a016f9bf634eff92f349f61f49aa0990d579bb50c423930700a6a2874371160f8664cc56a35580a7
-
SSDEEP
6144:4gWnATR10e5cDOT4cFxWdkGjZJi8mImDGHGaLtKXuRth1M+H:Cq10/DOT4ce3j7DDKXuRthG+
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe -
Kills process with taskkill 6 IoCs
pid Process 4968 taskkill.exe 2436 taskkill.exe 2648 taskkill.exe 4624 taskkill.exe 2888 taskkill.exe 4256 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe Token: SeDebugPrivilege 2888 taskkill.exe Token: SeDebugPrivilege 4256 taskkill.exe Token: SeDebugPrivilege 4968 taskkill.exe Token: SeDebugPrivilege 2436 taskkill.exe Token: SeDebugPrivilege 2648 taskkill.exe Token: SeDebugPrivilege 4624 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4912 wrote to memory of 4776 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 83 PID 4912 wrote to memory of 4776 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 83 PID 4912 wrote to memory of 4776 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 83 PID 4776 wrote to memory of 2888 4776 cmd.exe 84 PID 4776 wrote to memory of 2888 4776 cmd.exe 84 PID 4776 wrote to memory of 2888 4776 cmd.exe 84 PID 4912 wrote to memory of 608 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 85 PID 4912 wrote to memory of 608 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 85 PID 4912 wrote to memory of 608 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 85 PID 608 wrote to memory of 4256 608 cmd.exe 86 PID 608 wrote to memory of 4256 608 cmd.exe 86 PID 608 wrote to memory of 4256 608 cmd.exe 86 PID 4912 wrote to memory of 4792 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 87 PID 4912 wrote to memory of 4792 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 87 PID 4912 wrote to memory of 4792 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 87 PID 4792 wrote to memory of 4968 4792 cmd.exe 88 PID 4792 wrote to memory of 4968 4792 cmd.exe 88 PID 4792 wrote to memory of 4968 4792 cmd.exe 88 PID 4912 wrote to memory of 4360 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 89 PID 4912 wrote to memory of 4360 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 89 PID 4912 wrote to memory of 4360 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 89 PID 4360 wrote to memory of 2436 4360 cmd.exe 90 PID 4360 wrote to memory of 2436 4360 cmd.exe 90 PID 4360 wrote to memory of 2436 4360 cmd.exe 90 PID 4912 wrote to memory of 2728 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 91 PID 4912 wrote to memory of 2728 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 91 PID 4912 wrote to memory of 2728 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 91 PID 2728 wrote to memory of 2648 2728 cmd.exe 92 PID 2728 wrote to memory of 2648 2728 cmd.exe 92 PID 2728 wrote to memory of 2648 2728 cmd.exe 92 PID 4912 wrote to memory of 1540 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 93 PID 4912 wrote to memory of 1540 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 93 PID 4912 wrote to memory of 1540 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 93 PID 1540 wrote to memory of 4624 1540 cmd.exe 94 PID 1540 wrote to memory of 4624 1540 cmd.exe 94 PID 1540 wrote to memory of 4624 1540 cmd.exe 94 PID 4912 wrote to memory of 1896 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 95 PID 4912 wrote to memory of 1896 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 95 PID 4912 wrote to memory of 1896 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 95 PID 1896 wrote to memory of 4996 1896 cmd.exe 96 PID 1896 wrote to memory of 4996 1896 cmd.exe 96 PID 1896 wrote to memory of 4996 1896 cmd.exe 96 PID 4912 wrote to memory of 4636 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 97 PID 4912 wrote to memory of 4636 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 97 PID 4912 wrote to memory of 4636 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 97 PID 4636 wrote to memory of 1444 4636 cmd.exe 98 PID 4636 wrote to memory of 1444 4636 cmd.exe 98 PID 4636 wrote to memory of 1444 4636 cmd.exe 98 PID 4912 wrote to memory of 1952 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 99 PID 4912 wrote to memory of 1952 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 99 PID 4912 wrote to memory of 1952 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 99 PID 1952 wrote to memory of 2372 1952 cmd.exe 100 PID 1952 wrote to memory of 2372 1952 cmd.exe 100 PID 1952 wrote to memory of 2372 1952 cmd.exe 100 PID 4912 wrote to memory of 208 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 101 PID 4912 wrote to memory of 208 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 101 PID 4912 wrote to memory of 208 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 101 PID 208 wrote to memory of 4512 208 cmd.exe 102 PID 208 wrote to memory of 4512 208 cmd.exe 102 PID 208 wrote to memory of 4512 208 cmd.exe 102 PID 4912 wrote to memory of 4804 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 103 PID 4912 wrote to memory of 4804 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 103 PID 4912 wrote to memory of 4804 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 103 PID 4912 wrote to memory of 4260 4912 ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe 104 -
Views/modifies file attributes 1 TTPs 5 IoCs
pid Process 4996 attrib.exe 1444 attrib.exe 2372 attrib.exe 4512 attrib.exe 4272 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe"C:\Users\Admin\AppData\Local\Temp\ef9e517a597bb154f045d58dd7dda00e421c69154777b79b89b9659c5b7e8061.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill -f -im 'explorer.exe'2⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im 'explorer.exe'3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill -f -im 'cmd.exe'2⤵
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im 'cmd.exe'3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4256
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill -f -im 'powershell.exe'2⤵
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im 'powershell.exe'3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill -f -im 'powershell_ise.exe'2⤵
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im 'powershell_ise.exe'3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill -f -im 'studentmain.exe'2⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im 'studentmain.exe'3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill -f -im 'taskmgr.exe'2⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\taskkill.exetaskkill -f -im 'taskmgr.exe'3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4624
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -H C:\bootmgr2⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\attrib.exeattrib -S -H C:\bootmgr3⤵
- Views/modifies file attributes
PID:4996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -H C:\boot.ini2⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\attrib.exeattrib -S -H C:\boot.ini3⤵
- Views/modifies file attributes
PID:1444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -H C:\ntldr2⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\attrib.exeattrib -S -H C:\ntldr3⤵
- Views/modifies file attributes
PID:2372
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -H C:\Autoexec.bat2⤵
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\attrib.exeattrib -S -H C:\Autoexec.bat3⤵
- Views/modifies file attributes
PID:4512
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del -f -s -q C:\Autoexec.bat2⤵PID:4804
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del -f -s -q C:\windows\win.ini2⤵PID:4260
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del -f -s -q C:\windows\system.ini2⤵PID:4332
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -H C:\config.sys2⤵PID:3080
-
C:\Windows\SysWOW64\attrib.exeattrib -S -H C:\config.sys3⤵
- Views/modifies file attributes
PID:4272
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del -f -s -q C:\config.sys2⤵PID:3852
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del -f -s -q C:\ntldr2⤵PID:3528
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del -f -s -q C:\boot.ini2⤵PID:3576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del -f -s -q C:\bootmgr2⤵PID:3356
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh interface set interface '±¾µØÁ¬½Ó' disabled2⤵PID:5008
-
C:\Windows\SysWOW64\netsh.exenetsh interface set interface '±¾µØÁ¬½Ó' disabled3⤵PID:3568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh interface set interface 'WLAN' disabled2⤵PID:2072
-
C:\Windows\SysWOW64\netsh.exenetsh interface set interface 'WLAN' disabled3⤵PID:4668
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ren C:\*.* *.taierzhuang2⤵PID:1204
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del -f -s -q C:\*.*2⤵PID:3788
-