Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
27-08-2023 08:08
Static task
static1
Behavioral task
behavioral1
Sample
672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe
Resource
win10v2004-20230703-en
General
-
Target
672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe
-
Size
676KB
-
MD5
2ab765da96e5e7d082f3cd11be081654
-
SHA1
897f7919c3577a95dbd3d7ba0633f87cdf0ba4f5
-
SHA256
672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9
-
SHA512
f892d367ed546c948001ba0a214011b13faa35b2ab11f09ae4ea02c4d0be31025201524a38ea56ab3f249a517b49edf3dffef6899bbfd33eab12aa3845dd2d03
-
SSDEEP
6144:z5+wzHywOv9sn4OwB7p+S+Wo89UNS8VuiIWUlhxcGsZ0yO1g/rTDAsldDapA3qkq:z5+wjsyn4OwF0S3ninUXgA1OrHNl0n
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: format.com File opened (read-only) \??\D: format.com File opened (read-only) \??\E: format.com File opened (read-only) \??\G: format.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\physicaldrive0 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 1520 format.com Token: SeBackupPrivilege 2268 format.com -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2788 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 2788 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2788 wrote to memory of 1676 2788 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 28 PID 2788 wrote to memory of 1676 2788 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 28 PID 2788 wrote to memory of 1676 2788 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 28 PID 2788 wrote to memory of 1676 2788 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 28 PID 2788 wrote to memory of 2316 2788 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 29 PID 2788 wrote to memory of 2316 2788 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 29 PID 2788 wrote to memory of 2316 2788 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 29 PID 2788 wrote to memory of 2316 2788 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 29 PID 2788 wrote to memory of 2444 2788 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 37 PID 2788 wrote to memory of 2444 2788 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 37 PID 2788 wrote to memory of 2444 2788 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 37 PID 2788 wrote to memory of 2444 2788 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 37 PID 2788 wrote to memory of 2068 2788 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 30 PID 2788 wrote to memory of 2068 2788 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 30 PID 2788 wrote to memory of 2068 2788 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 30 PID 2788 wrote to memory of 2068 2788 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 30 PID 2788 wrote to memory of 2212 2788 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 33 PID 2788 wrote to memory of 2212 2788 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 33 PID 2788 wrote to memory of 2212 2788 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 33 PID 2788 wrote to memory of 2212 2788 672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe 33 PID 2316 wrote to memory of 2280 2316 cmd.exe 38 PID 2316 wrote to memory of 2280 2316 cmd.exe 38 PID 2316 wrote to memory of 2280 2316 cmd.exe 38 PID 2316 wrote to memory of 2280 2316 cmd.exe 38 PID 2068 wrote to memory of 1520 2068 cmd.exe 42 PID 2068 wrote to memory of 1520 2068 cmd.exe 42 PID 2068 wrote to memory of 1520 2068 cmd.exe 42 PID 2068 wrote to memory of 1520 2068 cmd.exe 42 PID 1676 wrote to memory of 2268 1676 cmd.exe 41 PID 1676 wrote to memory of 2268 1676 cmd.exe 41 PID 1676 wrote to memory of 2268 1676 cmd.exe 41 PID 1676 wrote to memory of 2268 1676 cmd.exe 41 PID 2444 wrote to memory of 2948 2444 cmd.exe 40 PID 2444 wrote to memory of 2948 2444 cmd.exe 40 PID 2444 wrote to memory of 2948 2444 cmd.exe 40 PID 2444 wrote to memory of 2948 2444 cmd.exe 40 PID 2212 wrote to memory of 2900 2212 cmd.exe 39 PID 2212 wrote to memory of 2900 2212 cmd.exe 39 PID 2212 wrote to memory of 2900 2212 cmd.exe 39 PID 2212 wrote to memory of 2900 2212 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe"C:\Users\Admin\AppData\Local\Temp\672cfd7ff738e393eef880a9b878ca44d291898e93299de854e498b84b0b6fd9.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\cmd.execmd /c format c: /q /y2⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\format.comformat c: /q /y3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c format d: /q /y2⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\format.comformat d: /q /y3⤵
- Enumerates connected drives
PID:2280
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c format f: /q /y2⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\format.comformat f: /q /y3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c format g: /q /y2⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\format.comformat g: /q /y3⤵
- Enumerates connected drives
PID:2900
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c format e: /q /y2⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\format.comformat e: /q /y3⤵
- Enumerates connected drives
PID:2948
-
-