Overview
overview
10Static
static
10Bootkits/5...1a.exe
windows7-x64
1Bootkits/5...1a.exe
windows10-2004-x64
6Bootkits/6...86.exe
windows7-x64
7Bootkits/6...86.exe
windows10-2004-x64
7Bootkits/8...f6.msi
windows7-x64
7Bootkits/8...f6.msi
windows10-2004-x64
7Bootkits/f...b1.exe
windows7-x64
7Bootkits/f...b1.exe
windows10-2004-x64
Rootkits/0...c7.exe
windows7-x64
8Rootkits/0...c7.exe
windows10-2004-x64
8Rootkits/0...6d.exe
windows7-x64
10Rootkits/0...6d.exe
windows10-2004-x64
1Rootkits/0...ae.exe
windows7-x64
1Rootkits/0...ae.exe
windows10-2004-x64
1Rootkits/0...3e.exe
windows7-x64
7Rootkits/0...3e.exe
windows10-2004-x64
10Rootkits/0...10.exe
windows7-x64
7Rootkits/0...10.exe
windows10-2004-x64
7Rootkits/2...8e.dll
windows7-x64
1Rootkits/2...8e.dll
windows10-2004-x64
1Rootkits/2...a4.exe
windows7-x64
10Rootkits/2...a4.exe
windows10-2004-x64
Rootkits/4...1b.exe
windows7-x64
7Rootkits/4...1b.exe
windows10-2004-x64
7Rootkits/6...d9.exe
windows7-x64
1Rootkits/6...d9.exe
windows10-2004-x64
1Rootkits/7...e8.exe
windows7-x64
7Rootkits/7...e8.exe
windows10-2004-x64
7Rootkits/8...22.exe
windows7-x64
1Rootkits/8...22.exe
windows10-2004-x64
1Rootkits/9...99.exe
windows7-x64
8Rootkits/9...99.exe
windows10-2004-x64
8Analysis
-
max time kernel
192s -
max time network
61s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
08-11-2023 03:15
Behavioral task
behavioral1
Sample
Bootkits/5ef62c780d7c9f82dea098972f66d5b3367841913444933cdb779adaecd06d1a.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Bootkits/5ef62c780d7c9f82dea098972f66d5b3367841913444933cdb779adaecd06d1a.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
Bootkits/6b0cd074a6c556f4d1fe0088c15160eb13f847974c4307f9eeeea4dc33d49286.exe
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
Bootkits/6b0cd074a6c556f4d1fe0088c15160eb13f847974c4307f9eeeea4dc33d49286.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
Bootkits/8dcc573293ae9a545655a47e23f106738a190f5318c31124bd3a73b12f128df6.msi
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
Bootkits/8dcc573293ae9a545655a47e23f106738a190f5318c31124bd3a73b12f128df6.msi
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
Bootkits/f428b4d0673ae67472fbe212086e70eeb5b6876e80a74b59ff8ba3e6def5e9b1.exe
Resource
win7-20231025-en
Behavioral task
behavioral8
Sample
Bootkits/f428b4d0673ae67472fbe212086e70eeb5b6876e80a74b59ff8ba3e6def5e9b1.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
Rootkits/03e903602037420acf4d1bc5084923c59385c5594f3a2de6fcf320bd4746d6c7.exe
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
Rootkits/03e903602037420acf4d1bc5084923c59385c5594f3a2de6fcf320bd4746d6c7.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral11
Sample
Rootkits/044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
Rootkits/044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
Rootkits/0925b8985b19d7925d68186d666b0050a4cb3f2a577d64765d770a57a2eab9ae.exe
Resource
win7-20231020-en
Behavioral task
behavioral14
Sample
Rootkits/0925b8985b19d7925d68186d666b0050a4cb3f2a577d64765d770a57a2eab9ae.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral15
Sample
Rootkits/096322b16a7395e5534e9db6752aab1bd54275515f33f993d066ec7b46ed5b3e.exe
Resource
win7-20231023-en
Behavioral task
behavioral16
Sample
Rootkits/096322b16a7395e5534e9db6752aab1bd54275515f33f993d066ec7b46ed5b3e.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral17
Sample
Rootkits/0b1b37d85a27819a8b4b9d7691e55dfc93311f7d5159433d1ac09854fcb13510.exe
Resource
win7-20231023-en
Behavioral task
behavioral18
Sample
Rootkits/0b1b37d85a27819a8b4b9d7691e55dfc93311f7d5159433d1ac09854fcb13510.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
Rootkits/2141974f665f4d8fecb6d8ea06add624b57f320f901368847175570ee716fd8e.dll
Resource
win7-20231023-en
Behavioral task
behavioral20
Sample
Rootkits/2141974f665f4d8fecb6d8ea06add624b57f320f901368847175570ee716fd8e.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
Rootkits/22ee7b8104599b47313195598ffc34aafd6a6552dcce0e7b3232ced3a90ac9a4.exe
Resource
win7-20231020-en
Behavioral task
behavioral22
Sample
Rootkits/22ee7b8104599b47313195598ffc34aafd6a6552dcce0e7b3232ced3a90ac9a4.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral23
Sample
Rootkits/40fd1fcff12afcf503175d91a18d7a6f7b4ade68726328db38eb6fd74304561b.exe
Resource
win7-20231023-en
Behavioral task
behavioral24
Sample
Rootkits/40fd1fcff12afcf503175d91a18d7a6f7b4ade68726328db38eb6fd74304561b.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral25
Sample
Rootkits/659e0d1b2405cadfa560fe648cbf6866720dd40bb6f4081d3dce2dffe20595d9.exe
Resource
win7-20231025-en
Behavioral task
behavioral26
Sample
Rootkits/659e0d1b2405cadfa560fe648cbf6866720dd40bb6f4081d3dce2dffe20595d9.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral27
Sample
Rootkits/757cd417096f37de99461b69b70ccc532fb294b8ecbf18e3fddaea7bb6058ce8.exe
Resource
win7-20231023-en
Behavioral task
behavioral28
Sample
Rootkits/757cd417096f37de99461b69b70ccc532fb294b8ecbf18e3fddaea7bb6058ce8.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral29
Sample
Rootkits/84ed7fec67de5621806dbb43af5167a5fc60ab7f2403448519dc0eca2b8f9022.exe
Resource
win7-20231023-en
Behavioral task
behavioral30
Sample
Rootkits/84ed7fec67de5621806dbb43af5167a5fc60ab7f2403448519dc0eca2b8f9022.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral31
Sample
Rootkits/9114dc1c44f6a1b7d63ca95e04541d833c49a3e65a717471042bd0ec19a3eb99.exe
Resource
win7-20231023-en
Behavioral task
behavioral32
Sample
Rootkits/9114dc1c44f6a1b7d63ca95e04541d833c49a3e65a717471042bd0ec19a3eb99.exe
Resource
win10v2004-20231023-en
General
-
Target
Rootkits/044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe
-
Size
246KB
-
MD5
5b65e0442761c3ba7ab13f19e696a3ad
-
SHA1
840cd5fabb617cdfd848ff29253b4cce79213a35
-
SHA256
044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d
-
SHA512
a5af3f57bbeea72a98fa3fcf499f98e568994a9ea29ab5558fc691d83d97decf2c9aa17d2f157442baf63c06b8fcc3c604a5098289c991cd7b061cb22cd64ec7
-
SSDEEP
3072:dZvq0Fnr1gWPgOYVkN6rnhccEYMY2wuoyq8pq+8MhHRIK8k4B7KHpwRXDYNdY2vx:dZvdr1bkVkNwzEJwu1Z/L8hgpwZY79
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MpsSvc\Parameters\PortKeywords\DHCP svchost.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\DHCP\Collection svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exepid process 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1204 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exedescription pid process Token: SeDebugPrivilege 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exedescription pid process target process PID 2648 wrote to memory of 424 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe winlogon.exe PID 2648 wrote to memory of 468 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe services.exe PID 2648 wrote to memory of 484 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe lsass.exe PID 2648 wrote to memory of 492 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe lsm.exe PID 2648 wrote to memory of 600 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe svchost.exe PID 2648 wrote to memory of 680 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe svchost.exe PID 2648 wrote to memory of 764 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe svchost.exe PID 2648 wrote to memory of 816 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe svchost.exe PID 2648 wrote to memory of 860 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe svchost.exe PID 2648 wrote to memory of 972 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe svchost.exe PID 2648 wrote to memory of 272 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe svchost.exe PID 2648 wrote to memory of 916 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe spoolsv.exe PID 2648 wrote to memory of 1060 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe svchost.exe PID 2648 wrote to memory of 1120 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe taskhost.exe PID 2648 wrote to memory of 1176 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe Dwm.exe PID 2648 wrote to memory of 1204 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe Explorer.EXE PID 2648 wrote to memory of 2224 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe svchost.exe PID 2648 wrote to memory of 2076 2648 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe sppsvc.exe
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:484
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1060
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:2076
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:2224
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1120
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:916
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:272
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:972
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:860
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:816
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵
- Modifies security service
PID:764
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:680
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:600
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:424
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:492
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\Rootkits\044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe"C:\Users\Admin\AppData\Local\Temp\Rootkits\044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176