Overview
overview
10Static
static
10Bootkits/5...1a.exe
windows7-x64
1Bootkits/5...1a.exe
windows10-2004-x64
6Bootkits/6...86.exe
windows7-x64
7Bootkits/6...86.exe
windows10-2004-x64
7Bootkits/8...f6.msi
windows7-x64
7Bootkits/8...f6.msi
windows10-2004-x64
7Bootkits/f...b1.exe
windows7-x64
7Bootkits/f...b1.exe
windows10-2004-x64
Rootkits/0...c7.exe
windows7-x64
8Rootkits/0...c7.exe
windows10-2004-x64
8Rootkits/0...6d.exe
windows7-x64
10Rootkits/0...6d.exe
windows10-2004-x64
1Rootkits/0...ae.exe
windows7-x64
1Rootkits/0...ae.exe
windows10-2004-x64
1Rootkits/0...3e.exe
windows7-x64
7Rootkits/0...3e.exe
windows10-2004-x64
10Rootkits/0...10.exe
windows7-x64
7Rootkits/0...10.exe
windows10-2004-x64
7Rootkits/2...8e.dll
windows7-x64
1Rootkits/2...8e.dll
windows10-2004-x64
1Rootkits/2...a4.exe
windows7-x64
10Rootkits/2...a4.exe
windows10-2004-x64
Rootkits/4...1b.exe
windows7-x64
7Rootkits/4...1b.exe
windows10-2004-x64
7Rootkits/6...d9.exe
windows7-x64
1Rootkits/6...d9.exe
windows10-2004-x64
1Rootkits/7...e8.exe
windows7-x64
7Rootkits/7...e8.exe
windows10-2004-x64
7Rootkits/8...22.exe
windows7-x64
1Rootkits/8...22.exe
windows10-2004-x64
1Rootkits/9...99.exe
windows7-x64
8Rootkits/9...99.exe
windows10-2004-x64
8Analysis
-
max time kernel
49s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2023 03:15
Behavioral task
behavioral1
Sample
Bootkits/5ef62c780d7c9f82dea098972f66d5b3367841913444933cdb779adaecd06d1a.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Bootkits/5ef62c780d7c9f82dea098972f66d5b3367841913444933cdb779adaecd06d1a.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
Bootkits/6b0cd074a6c556f4d1fe0088c15160eb13f847974c4307f9eeeea4dc33d49286.exe
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
Bootkits/6b0cd074a6c556f4d1fe0088c15160eb13f847974c4307f9eeeea4dc33d49286.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
Bootkits/8dcc573293ae9a545655a47e23f106738a190f5318c31124bd3a73b12f128df6.msi
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
Bootkits/8dcc573293ae9a545655a47e23f106738a190f5318c31124bd3a73b12f128df6.msi
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
Bootkits/f428b4d0673ae67472fbe212086e70eeb5b6876e80a74b59ff8ba3e6def5e9b1.exe
Resource
win7-20231025-en
Behavioral task
behavioral8
Sample
Bootkits/f428b4d0673ae67472fbe212086e70eeb5b6876e80a74b59ff8ba3e6def5e9b1.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
Rootkits/03e903602037420acf4d1bc5084923c59385c5594f3a2de6fcf320bd4746d6c7.exe
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
Rootkits/03e903602037420acf4d1bc5084923c59385c5594f3a2de6fcf320bd4746d6c7.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral11
Sample
Rootkits/044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
Rootkits/044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
Rootkits/0925b8985b19d7925d68186d666b0050a4cb3f2a577d64765d770a57a2eab9ae.exe
Resource
win7-20231020-en
Behavioral task
behavioral14
Sample
Rootkits/0925b8985b19d7925d68186d666b0050a4cb3f2a577d64765d770a57a2eab9ae.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral15
Sample
Rootkits/096322b16a7395e5534e9db6752aab1bd54275515f33f993d066ec7b46ed5b3e.exe
Resource
win7-20231023-en
Behavioral task
behavioral16
Sample
Rootkits/096322b16a7395e5534e9db6752aab1bd54275515f33f993d066ec7b46ed5b3e.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral17
Sample
Rootkits/0b1b37d85a27819a8b4b9d7691e55dfc93311f7d5159433d1ac09854fcb13510.exe
Resource
win7-20231023-en
Behavioral task
behavioral18
Sample
Rootkits/0b1b37d85a27819a8b4b9d7691e55dfc93311f7d5159433d1ac09854fcb13510.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
Rootkits/2141974f665f4d8fecb6d8ea06add624b57f320f901368847175570ee716fd8e.dll
Resource
win7-20231023-en
Behavioral task
behavioral20
Sample
Rootkits/2141974f665f4d8fecb6d8ea06add624b57f320f901368847175570ee716fd8e.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
Rootkits/22ee7b8104599b47313195598ffc34aafd6a6552dcce0e7b3232ced3a90ac9a4.exe
Resource
win7-20231020-en
Behavioral task
behavioral22
Sample
Rootkits/22ee7b8104599b47313195598ffc34aafd6a6552dcce0e7b3232ced3a90ac9a4.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral23
Sample
Rootkits/40fd1fcff12afcf503175d91a18d7a6f7b4ade68726328db38eb6fd74304561b.exe
Resource
win7-20231023-en
Behavioral task
behavioral24
Sample
Rootkits/40fd1fcff12afcf503175d91a18d7a6f7b4ade68726328db38eb6fd74304561b.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral25
Sample
Rootkits/659e0d1b2405cadfa560fe648cbf6866720dd40bb6f4081d3dce2dffe20595d9.exe
Resource
win7-20231025-en
Behavioral task
behavioral26
Sample
Rootkits/659e0d1b2405cadfa560fe648cbf6866720dd40bb6f4081d3dce2dffe20595d9.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral27
Sample
Rootkits/757cd417096f37de99461b69b70ccc532fb294b8ecbf18e3fddaea7bb6058ce8.exe
Resource
win7-20231023-en
Behavioral task
behavioral28
Sample
Rootkits/757cd417096f37de99461b69b70ccc532fb294b8ecbf18e3fddaea7bb6058ce8.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral29
Sample
Rootkits/84ed7fec67de5621806dbb43af5167a5fc60ab7f2403448519dc0eca2b8f9022.exe
Resource
win7-20231023-en
Behavioral task
behavioral30
Sample
Rootkits/84ed7fec67de5621806dbb43af5167a5fc60ab7f2403448519dc0eca2b8f9022.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral31
Sample
Rootkits/9114dc1c44f6a1b7d63ca95e04541d833c49a3e65a717471042bd0ec19a3eb99.exe
Resource
win7-20231023-en
Behavioral task
behavioral32
Sample
Rootkits/9114dc1c44f6a1b7d63ca95e04541d833c49a3e65a717471042bd0ec19a3eb99.exe
Resource
win10v2004-20231023-en
General
-
Target
Rootkits/044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe
-
Size
246KB
-
MD5
5b65e0442761c3ba7ab13f19e696a3ad
-
SHA1
840cd5fabb617cdfd848ff29253b4cce79213a35
-
SHA256
044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d
-
SHA512
a5af3f57bbeea72a98fa3fcf499f98e568994a9ea29ab5558fc691d83d97decf2c9aa17d2f157442baf63c06b8fcc3c604a5098289c991cd7b061cb22cd64ec7
-
SSDEEP
3072:dZvq0Fnr1gWPgOYVkN6rnhccEYMY2wuoyq8pq+8MhHRIK8k4B7KHpwRXDYNdY2vx:dZvdr1bkVkNwzEJwu1Z/L8hgpwZY79
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exepid process 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exedescription pid process Token: SeDebugPrivilege 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exelsass.exedescription pid process target process PID 4984 wrote to memory of 632 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe winlogon.exe PID 4984 wrote to memory of 692 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe lsass.exe PID 4984 wrote to memory of 972 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe svchost.exe PID 692 wrote to memory of 2544 692 lsass.exe sysmon.exe PID 4984 wrote to memory of 404 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe dwm.exe PID 4984 wrote to memory of 444 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe svchost.exe PID 4984 wrote to memory of 1040 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe svchost.exe PID 4984 wrote to memory of 1064 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe svchost.exe PID 4984 wrote to memory of 1112 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe svchost.exe PID 4984 wrote to memory of 1216 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe svchost.exe PID 4984 wrote to memory of 1248 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe svchost.exe PID 4984 wrote to memory of 1336 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe svchost.exe PID 4984 wrote to memory of 1352 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe svchost.exe PID 4984 wrote to memory of 1368 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe svchost.exe PID 4984 wrote to memory of 1464 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe svchost.exe PID 4984 wrote to memory of 1472 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe svchost.exe PID 4984 wrote to memory of 1536 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe svchost.exe PID 4984 wrote to memory of 1544 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe svchost.exe
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\Rootkits\044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe"C:\Users\Admin\AppData\Local\Temp\Rootkits\044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/404-14-0x0000020ADDD60000-0x0000020ADDD8A000-memory.dmpFilesize
168KB
-
memory/404-25-0x0000020ADDD60000-0x0000020ADDD8A000-memory.dmpFilesize
168KB
-
memory/444-30-0x000001BFB2B60000-0x000001BFB2B8A000-memory.dmpFilesize
168KB
-
memory/444-24-0x00007FFF8E850000-0x00007FFF8E860000-memory.dmpFilesize
64KB
-
memory/444-21-0x000001BFB2B60000-0x000001BFB2B8A000-memory.dmpFilesize
168KB
-
memory/632-2-0x0000022E490A0000-0x0000022E490C3000-memory.dmpFilesize
140KB
-
memory/632-8-0x00007FFFCE86D000-0x00007FFFCE86E000-memory.dmpFilesize
4KB
-
memory/632-5-0x0000022E490D0000-0x0000022E490FA000-memory.dmpFilesize
168KB
-
memory/632-11-0x00007FFFCE86F000-0x00007FFFCE870000-memory.dmpFilesize
4KB
-
memory/632-55-0x0000022E490D0000-0x0000022E490FA000-memory.dmpFilesize
168KB
-
memory/692-19-0x00007FFFCE86D000-0x00007FFFCE86E000-memory.dmpFilesize
4KB
-
memory/692-16-0x000002DA9ED40000-0x000002DA9ED6A000-memory.dmpFilesize
168KB
-
memory/692-7-0x000002DA9ED40000-0x000002DA9ED6A000-memory.dmpFilesize
168KB
-
memory/692-9-0x00007FFF8E850000-0x00007FFF8E860000-memory.dmpFilesize
64KB
-
memory/972-28-0x00007FFFCE86C000-0x00007FFFCE86D000-memory.dmpFilesize
4KB
-
memory/972-13-0x000001FD87FE0000-0x000001FD8800A000-memory.dmpFilesize
168KB
-
memory/972-22-0x000001FD87FE0000-0x000001FD8800A000-memory.dmpFilesize
168KB
-
memory/972-17-0x00007FFF8E850000-0x00007FFF8E860000-memory.dmpFilesize
64KB
-
memory/1040-23-0x000001E9F2140000-0x000001E9F216A000-memory.dmpFilesize
168KB
-
memory/1040-26-0x00007FFF8E850000-0x00007FFF8E860000-memory.dmpFilesize
64KB
-
memory/1040-31-0x000001E9F2140000-0x000001E9F216A000-memory.dmpFilesize
168KB
-
memory/1064-35-0x00000298A9D90000-0x00000298A9DBA000-memory.dmpFilesize
168KB
-
memory/1064-37-0x00007FFF8E850000-0x00007FFF8E860000-memory.dmpFilesize
64KB
-
memory/1064-60-0x00000298A9D90000-0x00000298A9DBA000-memory.dmpFilesize
168KB
-
memory/1112-66-0x00000294C2D10000-0x00000294C2D3A000-memory.dmpFilesize
168KB
-
memory/1112-42-0x00000294C2D10000-0x00000294C2D3A000-memory.dmpFilesize
168KB
-
memory/1112-44-0x00007FFF8E850000-0x00007FFF8E860000-memory.dmpFilesize
64KB
-
memory/1216-46-0x0000028EAED90000-0x0000028EAEDBA000-memory.dmpFilesize
168KB
-
memory/1216-71-0x0000028EAED90000-0x0000028EAEDBA000-memory.dmpFilesize
168KB
-
memory/1216-45-0x00007FFF8E850000-0x00007FFF8E860000-memory.dmpFilesize
64KB
-
memory/1216-41-0x0000028EAED90000-0x0000028EAEDBA000-memory.dmpFilesize
168KB
-
memory/1248-50-0x00007FFF8E850000-0x00007FFF8E860000-memory.dmpFilesize
64KB
-
memory/1248-47-0x00000212E7BA0000-0x00000212E7BCA000-memory.dmpFilesize
168KB
-
memory/1248-88-0x00000212E7BA0000-0x00000212E7BCA000-memory.dmpFilesize
168KB
-
memory/1336-106-0x00000231BA490000-0x00000231BA4BA000-memory.dmpFilesize
168KB
-
memory/1336-54-0x00007FFF8E850000-0x00007FFF8E860000-memory.dmpFilesize
64KB
-
memory/1336-52-0x00000231BA490000-0x00000231BA4BA000-memory.dmpFilesize
168KB
-
memory/1352-59-0x000001EBEE510000-0x000001EBEE53A000-memory.dmpFilesize
168KB
-
memory/1352-61-0x00007FFF8E850000-0x00007FFF8E860000-memory.dmpFilesize
64KB
-
memory/1368-65-0x0000028538D70000-0x0000028538D9A000-memory.dmpFilesize
168KB
-
memory/1368-75-0x0000028538D70000-0x0000028538D9A000-memory.dmpFilesize
168KB
-
memory/1368-68-0x00007FFF8E850000-0x00007FFF8E860000-memory.dmpFilesize
64KB
-
memory/1464-69-0x00000297CB730000-0x00000297CB75A000-memory.dmpFilesize
168KB
-
memory/1464-72-0x00007FFF8E850000-0x00007FFF8E860000-memory.dmpFilesize
64KB
-
memory/1464-79-0x00000297CB730000-0x00000297CB75A000-memory.dmpFilesize
168KB
-
memory/1472-77-0x00000242F15B0000-0x00000242F15DA000-memory.dmpFilesize
168KB
-
memory/1472-80-0x00007FFF8E850000-0x00007FFF8E860000-memory.dmpFilesize
64KB
-
memory/1472-92-0x00000242F15B0000-0x00000242F15DA000-memory.dmpFilesize
168KB
-
memory/1536-81-0x000002283F290000-0x000002283F2BA000-memory.dmpFilesize
168KB
-
memory/1544-85-0x000002AB6D770000-0x000002AB6D79A000-memory.dmpFilesize
168KB
-
memory/1664-99-0x000001EF5B4A0000-0x000001EF5B4CA000-memory.dmpFilesize
168KB
-
memory/1676-96-0x00000282D40B0000-0x00000282D40DA000-memory.dmpFilesize
168KB
-
memory/1752-103-0x00000212755A0000-0x00000212755CA000-memory.dmpFilesize
168KB
-
memory/1784-110-0x00000239FAD40000-0x00000239FAD6A000-memory.dmpFilesize
168KB
-
memory/1872-114-0x000002446CBD0000-0x000002446CBFA000-memory.dmpFilesize
168KB
-
memory/4984-0-0x00007FFFCE7D0000-0x00007FFFCE9C5000-memory.dmpFilesize
2.0MB
-
memory/4984-1-0x00007FFFCC820000-0x00007FFFCC8DE000-memory.dmpFilesize
760KB