Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
12/11/2023, 03:55
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231023-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20231020-en
5 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
1.4MB
-
MD5
c8ab62607200e5651d504b5a2df1b9db
-
SHA1
e3903f250f5db3cecea59640fddef71b990691a2
-
SHA256
3981bd1d992c04c8e5ef133aca900b3983493a2b97a8b7f11ad7c9f46f6b244a
-
SHA512
b488d515ad1e04da4a75f332bd4d4cce858d06c73f18f864d0d027d86bf66fc1c79b76bdc06abf2661435cf25ac9e8f3d41ed936ef97411f5d761a16a8ffe9ba
-
SSDEEP
24576:4qcNYC9gJLw2ioTa+sJPq1kbMRlZ1Nd6gznqbqScWR8oHz0Dx/lzVCzTNgo6NoZI:4qUYCL2ioTa+sakoRlZggzqeSXRNOzVj
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3988-0-0x0000000000400000-0x000000000079B000-memory.dmp upx behavioral2/memory/3988-2-0x0000000000400000-0x000000000079B000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 tmp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3988 tmp.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3988 tmp.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3988 tmp.exe 3988 tmp.exe 3988 tmp.exe 3988 tmp.exe