Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
16-10-2023 11:21
Behavioral task
behavioral1
Sample
5c917a5e072a72cd920fcb3751517f00070db59b361354fba197d4782c6052b2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5c917a5e072a72cd920fcb3751517f00070db59b361354fba197d4782c6052b2.exe
Resource
win10v2004-20230915-en
General
-
Target
5c917a5e072a72cd920fcb3751517f00070db59b361354fba197d4782c6052b2.exe
-
Size
8.1MB
-
MD5
4f41e8caf5c87422b91d66b365aa895f
-
SHA1
9edc2aa4fae4afc125e8f6f57e06fc6ca44bf3cf
-
SHA256
5c917a5e072a72cd920fcb3751517f00070db59b361354fba197d4782c6052b2
-
SHA512
a0365d4e06f09e975469ecf112df3102675ca07ac461b5baf9815604090ca0cc229b50c1f18344da6deb8fdf1e0b158d5b55806761fff02be53cd56a63c1a081
-
SSDEEP
196608:oT758hA+ujbgeY5jhXRXDLymQPGVEQaKZtPx11f+k4ecmnQOg50:o/583SbA5jlRXXgPG/lZtPxCkSOg5
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2780-0-0x0000000000400000-0x0000000000E28000-memory.dmp upx behavioral1/memory/2780-3-0x0000000000400000-0x0000000000E28000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 5c917a5e072a72cd920fcb3751517f00070db59b361354fba197d4782c6052b2.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2780 5c917a5e072a72cd920fcb3751517f00070db59b361354fba197d4782c6052b2.exe 2780 5c917a5e072a72cd920fcb3751517f00070db59b361354fba197d4782c6052b2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c917a5e072a72cd920fcb3751517f00070db59b361354fba197d4782c6052b2.exe"C:\Users\Admin\AppData\Local\Temp\5c917a5e072a72cd920fcb3751517f00070db59b361354fba197d4782c6052b2.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
PID:2780