Analysis
-
max time kernel
119s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
08/10/2023, 01:33
Static task
static1
Behavioral task
behavioral1
Sample
2cbae886ed8ed486d4c2dc38f80f99757cda7f18a6e467474d2f947d2d44c178.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2cbae886ed8ed486d4c2dc38f80f99757cda7f18a6e467474d2f947d2d44c178.exe
Resource
win10v2004-20230915-en
General
-
Target
2cbae886ed8ed486d4c2dc38f80f99757cda7f18a6e467474d2f947d2d44c178.exe
-
Size
1.4MB
-
MD5
c3c35f756750d58ac592430aa5c76b86
-
SHA1
a12f768e606dc649dcb6e7169ec2534ff70773e1
-
SHA256
2cbae886ed8ed486d4c2dc38f80f99757cda7f18a6e467474d2f947d2d44c178
-
SHA512
92ee0b9734a8d11a1d8d34b4b157bf6be37f6120ae56c140e0b59939e5d07ffc593cc758aad7bb5a0c8e552a0960e72751b381edfadc04e679a0f227c9e13a85
-
SSDEEP
24576:9yntD8t2cKvn3QCAUYZta7XSSSQyl7iQ0SCGlAYjiCKGijdyp0JAHkYS+CKGijd1:9+tTcKYAYCrSH7iwC9JCKGijdyp0JAHl
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 2cbae886ed8ed486d4c2dc38f80f99757cda7f18a6e467474d2f947d2d44c178.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1896 2cbae886ed8ed486d4c2dc38f80f99757cda7f18a6e467474d2f947d2d44c178.exe 1896 2cbae886ed8ed486d4c2dc38f80f99757cda7f18a6e467474d2f947d2d44c178.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cbae886ed8ed486d4c2dc38f80f99757cda7f18a6e467474d2f947d2d44c178.exe"C:\Users\Admin\AppData\Local\Temp\2cbae886ed8ed486d4c2dc38f80f99757cda7f18a6e467474d2f947d2d44c178.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
PID:1896