Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2023 02:43
Behavioral task
behavioral1
Sample
e0e3af12a876bd1af6395c15cb19192ddc115cf808772805d12d1b754ecc3104.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e0e3af12a876bd1af6395c15cb19192ddc115cf808772805d12d1b754ecc3104.exe
Resource
win10v2004-20230915-en
General
-
Target
e0e3af12a876bd1af6395c15cb19192ddc115cf808772805d12d1b754ecc3104.exe
-
Size
13.9MB
-
MD5
1ed36d3c530539d389f8bffb7e9864e0
-
SHA1
bc8f0399ae3e323ac78353910e13f4eb3c6fd6fe
-
SHA256
e0e3af12a876bd1af6395c15cb19192ddc115cf808772805d12d1b754ecc3104
-
SHA512
7a4954e68ca2c06d890f0a6afee0bbd4423ec6746f854c5eebf3597499ce954fe3cf773d1e4278b0a08a99f4f95d731088a27208d12cb001de010bcdfb33b4c8
-
SSDEEP
393216:uSRUjcPcXvEVTkZsQhWtR9CaLYg7Zn9MnAeyjl0SgGyhyxoCuIv:hUjcfTylyemYg75+nArx0S+S
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3672-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3672-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3672-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3672-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3672-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3672-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3672-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3672-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3672-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3672-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3672-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3672-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3672-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3672-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3672-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3672-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3672-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3672-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3672-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3672-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3672-53-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3672-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3672-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3672-58-0x0000000010000000-0x000000001003E000-memory.dmp upx -
resource yara_rule behavioral2/memory/3672-4-0x0000000000400000-0x0000000001E64000-memory.dmp vmprotect behavioral2/memory/3672-33-0x0000000000400000-0x0000000001E64000-memory.dmp vmprotect -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 e0e3af12a876bd1af6395c15cb19192ddc115cf808772805d12d1b754ecc3104.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3672 e0e3af12a876bd1af6395c15cb19192ddc115cf808772805d12d1b754ecc3104.exe 3672 e0e3af12a876bd1af6395c15cb19192ddc115cf808772805d12d1b754ecc3104.exe 3672 e0e3af12a876bd1af6395c15cb19192ddc115cf808772805d12d1b754ecc3104.exe 3672 e0e3af12a876bd1af6395c15cb19192ddc115cf808772805d12d1b754ecc3104.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3672 e0e3af12a876bd1af6395c15cb19192ddc115cf808772805d12d1b754ecc3104.exe 3672 e0e3af12a876bd1af6395c15cb19192ddc115cf808772805d12d1b754ecc3104.exe 3672 e0e3af12a876bd1af6395c15cb19192ddc115cf808772805d12d1b754ecc3104.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0e3af12a876bd1af6395c15cb19192ddc115cf808772805d12d1b754ecc3104.exe"C:\Users\Admin\AppData\Local\Temp\e0e3af12a876bd1af6395c15cb19192ddc115cf808772805d12d1b754ecc3104.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3672