Overview
overview
10Static
static
10Bootkits/5...1a.exe
windows7-x64
1Bootkits/5...1a.exe
windows10-2004-x64
6Bootkits/6...86.exe
windows7-x64
7Bootkits/6...86.exe
windows10-2004-x64
7Bootkits/8...f6.msi
windows7-x64
7Bootkits/8...f6.msi
windows10-2004-x64
7Bootkits/f...b1.exe
windows7-x64
7Bootkits/f...b1.exe
windows10-2004-x64
Rootkits/0...c7.exe
windows7-x64
8Rootkits/0...c7.exe
windows10-2004-x64
8Rootkits/0...6d.exe
windows7-x64
10Rootkits/0...6d.exe
windows10-2004-x64
1Rootkits/0...ae.exe
windows7-x64
1Rootkits/0...ae.exe
windows10-2004-x64
1Rootkits/0...3e.exe
windows7-x64
7Rootkits/0...3e.exe
windows10-2004-x64
10Rootkits/0...10.exe
windows7-x64
7Rootkits/0...10.exe
windows10-2004-x64
7Rootkits/2...8e.dll
windows7-x64
1Rootkits/2...8e.dll
windows10-2004-x64
1Rootkits/2...a4.exe
windows7-x64
10Rootkits/2...a4.exe
windows10-2004-x64
Rootkits/4...1b.exe
windows7-x64
7Rootkits/4...1b.exe
windows10-2004-x64
7Rootkits/6...d9.exe
windows7-x64
1Rootkits/6...d9.exe
windows10-2004-x64
1Rootkits/7...e8.exe
windows7-x64
7Rootkits/7...e8.exe
windows10-2004-x64
7Rootkits/8...22.exe
windows7-x64
1Rootkits/8...22.exe
windows10-2004-x64
1Rootkits/9...99.exe
windows7-x64
8Rootkits/9...99.exe
windows10-2004-x64
8Analysis
-
max time kernel
49s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2023 03:15
Behavioral task
behavioral1
Sample
Bootkits/5ef62c780d7c9f82dea098972f66d5b3367841913444933cdb779adaecd06d1a.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Bootkits/5ef62c780d7c9f82dea098972f66d5b3367841913444933cdb779adaecd06d1a.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
Bootkits/6b0cd074a6c556f4d1fe0088c15160eb13f847974c4307f9eeeea4dc33d49286.exe
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
Bootkits/6b0cd074a6c556f4d1fe0088c15160eb13f847974c4307f9eeeea4dc33d49286.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
Bootkits/8dcc573293ae9a545655a47e23f106738a190f5318c31124bd3a73b12f128df6.msi
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
Bootkits/8dcc573293ae9a545655a47e23f106738a190f5318c31124bd3a73b12f128df6.msi
Resource
win10v2004-20231020-en
Behavioral task
behavioral7
Sample
Bootkits/f428b4d0673ae67472fbe212086e70eeb5b6876e80a74b59ff8ba3e6def5e9b1.exe
Resource
win7-20231025-en
Behavioral task
behavioral8
Sample
Bootkits/f428b4d0673ae67472fbe212086e70eeb5b6876e80a74b59ff8ba3e6def5e9b1.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral9
Sample
Rootkits/03e903602037420acf4d1bc5084923c59385c5594f3a2de6fcf320bd4746d6c7.exe
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
Rootkits/03e903602037420acf4d1bc5084923c59385c5594f3a2de6fcf320bd4746d6c7.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral11
Sample
Rootkits/044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
Rootkits/044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
Rootkits/0925b8985b19d7925d68186d666b0050a4cb3f2a577d64765d770a57a2eab9ae.exe
Resource
win7-20231020-en
Behavioral task
behavioral14
Sample
Rootkits/0925b8985b19d7925d68186d666b0050a4cb3f2a577d64765d770a57a2eab9ae.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral15
Sample
Rootkits/096322b16a7395e5534e9db6752aab1bd54275515f33f993d066ec7b46ed5b3e.exe
Resource
win7-20231023-en
Behavioral task
behavioral16
Sample
Rootkits/096322b16a7395e5534e9db6752aab1bd54275515f33f993d066ec7b46ed5b3e.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral17
Sample
Rootkits/0b1b37d85a27819a8b4b9d7691e55dfc93311f7d5159433d1ac09854fcb13510.exe
Resource
win7-20231023-en
Behavioral task
behavioral18
Sample
Rootkits/0b1b37d85a27819a8b4b9d7691e55dfc93311f7d5159433d1ac09854fcb13510.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
Rootkits/2141974f665f4d8fecb6d8ea06add624b57f320f901368847175570ee716fd8e.dll
Resource
win7-20231023-en
Behavioral task
behavioral20
Sample
Rootkits/2141974f665f4d8fecb6d8ea06add624b57f320f901368847175570ee716fd8e.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
Rootkits/22ee7b8104599b47313195598ffc34aafd6a6552dcce0e7b3232ced3a90ac9a4.exe
Resource
win7-20231020-en
Behavioral task
behavioral22
Sample
Rootkits/22ee7b8104599b47313195598ffc34aafd6a6552dcce0e7b3232ced3a90ac9a4.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral23
Sample
Rootkits/40fd1fcff12afcf503175d91a18d7a6f7b4ade68726328db38eb6fd74304561b.exe
Resource
win7-20231023-en
Behavioral task
behavioral24
Sample
Rootkits/40fd1fcff12afcf503175d91a18d7a6f7b4ade68726328db38eb6fd74304561b.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral25
Sample
Rootkits/659e0d1b2405cadfa560fe648cbf6866720dd40bb6f4081d3dce2dffe20595d9.exe
Resource
win7-20231025-en
Behavioral task
behavioral26
Sample
Rootkits/659e0d1b2405cadfa560fe648cbf6866720dd40bb6f4081d3dce2dffe20595d9.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral27
Sample
Rootkits/757cd417096f37de99461b69b70ccc532fb294b8ecbf18e3fddaea7bb6058ce8.exe
Resource
win7-20231023-en
Behavioral task
behavioral28
Sample
Rootkits/757cd417096f37de99461b69b70ccc532fb294b8ecbf18e3fddaea7bb6058ce8.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral29
Sample
Rootkits/84ed7fec67de5621806dbb43af5167a5fc60ab7f2403448519dc0eca2b8f9022.exe
Resource
win7-20231023-en
Behavioral task
behavioral30
Sample
Rootkits/84ed7fec67de5621806dbb43af5167a5fc60ab7f2403448519dc0eca2b8f9022.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral31
Sample
Rootkits/9114dc1c44f6a1b7d63ca95e04541d833c49a3e65a717471042bd0ec19a3eb99.exe
Resource
win7-20231023-en
Behavioral task
behavioral32
Sample
Rootkits/9114dc1c44f6a1b7d63ca95e04541d833c49a3e65a717471042bd0ec19a3eb99.exe
Resource
win10v2004-20231023-en
General
-
Target
Rootkits/044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe
-
Size
246KB
-
MD5
5b65e0442761c3ba7ab13f19e696a3ad
-
SHA1
840cd5fabb617cdfd848ff29253b4cce79213a35
-
SHA256
044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d
-
SHA512
a5af3f57bbeea72a98fa3fcf499f98e568994a9ea29ab5558fc691d83d97decf2c9aa17d2f157442baf63c06b8fcc3c604a5098289c991cd7b061cb22cd64ec7
-
SSDEEP
3072:dZvq0Fnr1gWPgOYVkN6rnhccEYMY2wuoyq8pq+8MhHRIK8k4B7KHpwRXDYNdY2vx:dZvdr1bkVkNwzEJwu1Z/L8hgpwZY79
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4984 wrote to memory of 632 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 3 PID 4984 wrote to memory of 692 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 1 PID 4984 wrote to memory of 972 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 14 PID 692 wrote to memory of 2544 692 lsass.exe 38 PID 4984 wrote to memory of 404 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 10 PID 4984 wrote to memory of 444 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 11 PID 4984 wrote to memory of 1040 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 12 PID 4984 wrote to memory of 1064 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 16 PID 4984 wrote to memory of 1112 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 17 PID 4984 wrote to memory of 1216 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 28 PID 4984 wrote to memory of 1248 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 27 PID 4984 wrote to memory of 1336 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 25 PID 4984 wrote to memory of 1352 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 18 PID 4984 wrote to memory of 1368 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 19 PID 4984 wrote to memory of 1464 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 20 PID 4984 wrote to memory of 1472 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 24 PID 4984 wrote to memory of 1536 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 21 PID 4984 wrote to memory of 1544 4984 044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe 22
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:692
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:632
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:404
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:444
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1040
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:972
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1064
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1112
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1352
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1368
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1536
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1544
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1472
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1336
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1248
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1216
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\Rootkits\044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe"C:\Users\Admin\AppData\Local\Temp\Rootkits\044d94183a778f39e47f255fcb985d20bfd885771a74217cfbca9e63d7d9936d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984