Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
27/08/2023, 00:18
Behavioral task
behavioral1
Sample
1769f09897c5716a5b60256c1de6a57209c19866c90c3f574fcb77e5f7c79876.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1769f09897c5716a5b60256c1de6a57209c19866c90c3f574fcb77e5f7c79876.exe
Resource
win10v2004-20230824-en
General
-
Target
1769f09897c5716a5b60256c1de6a57209c19866c90c3f574fcb77e5f7c79876.exe
-
Size
11.7MB
-
MD5
04c89542b82f442d7aee36600c4985a1
-
SHA1
bb11d544f07f88449405b49bf1595c23bc0c89a5
-
SHA256
1769f09897c5716a5b60256c1de6a57209c19866c90c3f574fcb77e5f7c79876
-
SHA512
9d6c19a4340f9c9fd02415068877af8806e528f1be9dcde700b6dd4ef43479e8307422c4c56019d8fb5fa87f7078f0b9047af7e518a25763dfe580592961a1ea
-
SSDEEP
196608:+cMX6U5z4nePG5XxPhW6c1OXkcVo9ooNwO0zuJdb0QMtHBwGdw:+N154naG5dh+OXXo9HwOEuJdYhwGS
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1400-41-0x0000000000310000-0x000000000031B000-memory.dmp upx behavioral1/memory/1400-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1400-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1400-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1400-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1400-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1400-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1400-53-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1400-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1400-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1400-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1400-63-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1400-65-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1400-67-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1400-69-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1400-72-0x0000000000310000-0x000000000031B000-memory.dmp upx behavioral1/memory/1400-74-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1400-76-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1400-80-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1400-82-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1400-86-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1400-90-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1400-95-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1400-97-0x0000000010000000-0x000000001003E000-memory.dmp upx -
resource yara_rule behavioral1/memory/1400-4-0x0000000000400000-0x0000000001F35000-memory.dmp vmprotect behavioral1/memory/1400-60-0x0000000000400000-0x0000000001F35000-memory.dmp vmprotect behavioral1/memory/1400-98-0x0000000000400000-0x0000000001F35000-memory.dmp vmprotect -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 1769f09897c5716a5b60256c1de6a57209c19866c90c3f574fcb77e5f7c79876.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1400 1769f09897c5716a5b60256c1de6a57209c19866c90c3f574fcb77e5f7c79876.exe 1400 1769f09897c5716a5b60256c1de6a57209c19866c90c3f574fcb77e5f7c79876.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1400 1769f09897c5716a5b60256c1de6a57209c19866c90c3f574fcb77e5f7c79876.exe 1400 1769f09897c5716a5b60256c1de6a57209c19866c90c3f574fcb77e5f7c79876.exe 1400 1769f09897c5716a5b60256c1de6a57209c19866c90c3f574fcb77e5f7c79876.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1769f09897c5716a5b60256c1de6a57209c19866c90c3f574fcb77e5f7c79876.exe"C:\Users\Admin\AppData\Local\Temp\1769f09897c5716a5b60256c1de6a57209c19866c90c3f574fcb77e5f7c79876.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1400