Analysis
-
max time kernel
5s -
max time network
9s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2023 01:20
Static task
static1
Behavioral task
behavioral1
Sample
44d2e396b06503c751d6d68cad42b034.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
44d2e396b06503c751d6d68cad42b034.exe
Resource
win10v2004-20230915-en
General
-
Target
44d2e396b06503c751d6d68cad42b034.exe
-
Size
6KB
-
MD5
44d2e396b06503c751d6d68cad42b034
-
SHA1
ed376d6821db15e81b4a075bd6140c4492c7c4f7
-
SHA256
960ff90ee327e8306b52ab4c1538587de65eb73eb7084d3623133f2df49afcf3
-
SHA512
18e681b130c065f119f7b8d99cf9325ea492a86829afb32d8dccbbcbcc0df277382dd8c5ce9aedeeeac6e56130219ac03ae4f8987e73793294d86a6808cb8789
-
SSDEEP
48:6PFbJ1ssjHduCNefok+1aVNMwEg+ucYYcpLh+i8MRvbFgkwZsFtR8l54PIQFipfG:5sjTgfRku1v78MRvRgd0PCzNt
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 44d2e396b06503c751d6d68cad42b034.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1272 44d2e396b06503c751d6d68cad42b034.exe