Analysis

  • max time kernel
    140s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 03:07

General

  • Target

    f1096b28311fa8c42aef79cb0ac401a183efd3e7d44f046ffb6e261bceb8ae64.exe

  • Size

    1.0MB

  • MD5

    d9bddcc58051fec6ac33fd7c9fa19ca9

  • SHA1

    f58cbaab1a133cb07fceb5800d9d3d03414ecbf9

  • SHA256

    f1096b28311fa8c42aef79cb0ac401a183efd3e7d44f046ffb6e261bceb8ae64

  • SHA512

    404147c42d4c36c30417aa2a172fc883d75fe843b5d5a8ee96cbcb79d519577b295de7aeb243aa13d5be75df1783b85da702c97958826dcdd10657a72bd3b24b

  • SSDEEP

    24576:UY0qFpsYqb4rQQ4+50xm4RQGHMaLUbG3sR9:UJYqi0xm4/LLUbGk

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1096b28311fa8c42aef79cb0ac401a183efd3e7d44f046ffb6e261bceb8ae64.exe
    "C:\Users\Admin\AppData\Local\Temp\f1096b28311fa8c42aef79cb0ac401a183efd3e7d44f046ffb6e261bceb8ae64.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:216

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads