Analysis
-
max time kernel
440s -
max time network
446s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 06:29
Static task
static1
Behavioral task
behavioral1
Sample
a5012e20342f4751360fd0d15ab013385cecd2a5f3e7a3e8503b1852d8499819.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
a5012e20342f4751360fd0d15ab013385cecd2a5f3e7a3e8503b1852d8499819.exe
Resource
win10v2004-20231023-en
General
-
Target
a5012e20342f4751360fd0d15ab013385cecd2a5f3e7a3e8503b1852d8499819.exe
-
Size
268KB
-
MD5
d7d67e69a4c10f18e3ff4af59d6210b9
-
SHA1
91b39c3ff15f0c66fa57cac02c4702c7df1ae6ab
-
SHA256
a5012e20342f4751360fd0d15ab013385cecd2a5f3e7a3e8503b1852d8499819
-
SHA512
cf24490da04e8d5b214377fabd9257154add56f5bf7da8c129772c7e359ed70deb7889cfe45821a18ef9833e0e6500bd8352697cb55571e3924c052f0a80e0a9
-
SSDEEP
6144:3JIZWO/Kk6NkJzhhNqJ6z6XQYsMP+AOk6TZmgWnh/:3+ZWjk6NkJzhmTyKsG/
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: a5012e20342f4751360fd0d15ab013385cecd2a5f3e7a3e8503b1852d8499819.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1448 a5012e20342f4751360fd0d15ab013385cecd2a5f3e7a3e8503b1852d8499819.exe Token: SeRestorePrivilege 1448 a5012e20342f4751360fd0d15ab013385cecd2a5f3e7a3e8503b1852d8499819.exe Token: SeTakeOwnershipPrivilege 1448 a5012e20342f4751360fd0d15ab013385cecd2a5f3e7a3e8503b1852d8499819.exe