Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-07-2023 10:05

General

  • Target

    pcyyb__installer.exe

  • Size

    6.3MB

  • MD5

    ceb0320e8ecca7765f2b645ad0c3126c

  • SHA1

    2b7783eab695504684219521c0840cbca8e6bd6a

  • SHA256

    258059c1d7ca6e90820d7b869d2368d4963bde7b3d95c39f0aad14cbb85c1868

  • SHA512

    2439271346d399a24e04ca9cd320c9c56c880f32ae455be79045f216d90fbaca9b503088c78ba6d8d6316d69058c49cbc49cc909b59dc906acf7057395a5354e

  • SSDEEP

    98304:GqpNBOLTydkla9/NXXiJJ+uCJDI7BclWSV7SxyqxrF:GqPBO6klaJNCJJGJsBeaF

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\pcyyb__installer.exe
    "C:\Users\Admin\AppData\Local\Temp\pcyyb__installer.exe"
    1⤵
    • Enumerates connected drives
    • Writes to the Master Boot Record (MBR)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:208
    • C:\Windows\System32\Wbem\wmic.exe
      wmic path Win32_ComputerSystem get HypervisorPresent
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4512
    • C:\Windows\System32\Wbem\wmic.exe
      wmic BaseBoard get Manufacturer
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3904

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads