Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2023, 19:46
Behavioral task
behavioral1
Sample
0d6d513acdade5762567ab7d40ea71846185b8e5c756ca241bdc0720188886b0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0d6d513acdade5762567ab7d40ea71846185b8e5c756ca241bdc0720188886b0.exe
Resource
win10v2004-20230831-en
General
-
Target
0d6d513acdade5762567ab7d40ea71846185b8e5c756ca241bdc0720188886b0.exe
-
Size
14.7MB
-
MD5
7b2737f883ec7c0792c89d2fe10ba959
-
SHA1
7323ee90384b973ab769d3cdce0297eb2c5ea95d
-
SHA256
0d6d513acdade5762567ab7d40ea71846185b8e5c756ca241bdc0720188886b0
-
SHA512
30b24b71fd0a849f4fc681645c2e4caf7c977bfbde608f4ef61af5bc37be54b82fe931112f759d41c8d5f85a309b1d481a2f63c53e309a4a0ba19424915ec87d
-
SSDEEP
393216:D0cC0/d4u1ffRPYdm79OHgnq6ayJ66R4UMB1ZM4Fn9qv:D0c7fhYchOAqzyc67M1Zt9qv
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/224-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/224-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/224-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/224-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/224-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/224-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/224-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/224-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/224-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/224-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/224-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/224-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/224-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/224-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/224-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/224-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/224-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/224-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/224-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/224-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/224-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/224-53-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/224-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/224-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/224-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/224-60-0x0000000010000000-0x000000001003E000-memory.dmp upx -
resource yara_rule behavioral2/memory/224-5-0x0000000000400000-0x000000000190D000-memory.dmp vmprotect behavioral2/memory/224-33-0x0000000000400000-0x000000000190D000-memory.dmp vmprotect -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 0d6d513acdade5762567ab7d40ea71846185b8e5c756ca241bdc0720188886b0.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 224 0d6d513acdade5762567ab7d40ea71846185b8e5c756ca241bdc0720188886b0.exe 224 0d6d513acdade5762567ab7d40ea71846185b8e5c756ca241bdc0720188886b0.exe 224 0d6d513acdade5762567ab7d40ea71846185b8e5c756ca241bdc0720188886b0.exe 224 0d6d513acdade5762567ab7d40ea71846185b8e5c756ca241bdc0720188886b0.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 224 0d6d513acdade5762567ab7d40ea71846185b8e5c756ca241bdc0720188886b0.exe 224 0d6d513acdade5762567ab7d40ea71846185b8e5c756ca241bdc0720188886b0.exe 224 0d6d513acdade5762567ab7d40ea71846185b8e5c756ca241bdc0720188886b0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d6d513acdade5762567ab7d40ea71846185b8e5c756ca241bdc0720188886b0.exe"C:\Users\Admin\AppData\Local\Temp\0d6d513acdade5762567ab7d40ea71846185b8e5c756ca241bdc0720188886b0.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:224