Analysis
-
max time kernel
0s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10/06/2023, 08:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
05277899.exe
Resource
win7-20230220-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
05277899.exe
Resource
win10v2004-20230220-en
4 signatures
150 seconds
Errors
Reason
Reading agent response: read tcp 10.127.0.1:53250->10.127.0.84:8000: read: connection reset by peer
General
-
Target
05277899.exe
-
Size
47KB
-
MD5
c3a434b97481aaeda073a7e47193485e
-
SHA1
aa9cc9a16e0afd0fbfe03f56a10cca7b718bac28
-
SHA256
d66e2dc064a613069e80a5b8684577f0174e017141425d3622811c6a97c87e64
-
SHA512
eb22f24a64527c7412dc4c492cb271b2152d90f0b84606f446c8a4995423708441ba61cc3c87eabda296d598ad128b8e0a6816491e3c297904272cfd412a7dca
-
SSDEEP
768:9yLqzcQ8zwtHEBbGoaPbs9IKRQ5qo2GLQdJhV4ztOyjg5YCtKO:cLqzcQ5kJxWpKRfzdJaIyjg57K
Score
6/10
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 05277899.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1696 05277899.exe