Analysis
-
max time kernel
7s -
max time network
9s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2023 10:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
09014499.exe
Resource
win7-20230220-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
09014499.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
09014499.exe
-
Size
266KB
-
MD5
59b67eedefb38bf48b9ad658e927d458
-
SHA1
e6811915564cc81e8e2ab0c28b5d37f5d338ac5d
-
SHA256
0e69afe93c6ca4efef5b28ab326795b1334a8268b39685c9a07e4d05202adb8c
-
SHA512
6e1e3ca11fec2adcc0f75a1c3248661c74f6d215c74d75f7c666de2a0db7878f87430058a21af8c1d7f55702a6c1a430c37d6512bcf00e326ac4e82dba846dc9
-
SSDEEP
6144:lJPaqJtBOJgX7BbTHYJU4FLSPMnmjhhunqd+T9pQ:lBaSX7FTHYJfLhTvQ
Score
6/10
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 09014499.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4256 4320 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4320 09014499.exe 4320 09014499.exe 4320 09014499.exe 4320 09014499.exe 4320 09014499.exe 4320 09014499.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4320 09014499.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\09014499.exe"C:\Users\Admin\AppData\Local\Temp\09014499.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 4882⤵
- Program crash
PID:4256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4320 -ip 43201⤵PID:4572