Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2023 02:51
Static task
static1
Behavioral task
behavioral1
Sample
15057376400ddba044817a9e75b1707439ad2cb95be11425cccff6afb43bb079.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
15057376400ddba044817a9e75b1707439ad2cb95be11425cccff6afb43bb079.exe
Resource
win10v2004-20231025-en
General
-
Target
15057376400ddba044817a9e75b1707439ad2cb95be11425cccff6afb43bb079.exe
-
Size
4.2MB
-
MD5
3b18588623fff071e9c04ee4c1389f43
-
SHA1
d799e9878f974489f7254846f89465ffd55fdaa3
-
SHA256
15057376400ddba044817a9e75b1707439ad2cb95be11425cccff6afb43bb079
-
SHA512
845faab1feb267371b1874c3b4097cae5b7adfcb52018c371a24d680206d30b7298166faec3f09d83603344a1419a5fee978d564148e3394398e178c03d1128b
-
SSDEEP
49152:LhE0OCNLt2s/AdJ1QMOZDzYLuos/sL6Qah0eXQEjjVHziQdWhbB86LdbaclqmVDa:LpNvMOGSos/sL+h0eXVRsm0qmhylpYm
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 15057376400ddba044817a9e75b1707439ad2cb95be11425cccff6afb43bb079.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4504 15057376400ddba044817a9e75b1707439ad2cb95be11425cccff6afb43bb079.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4832 4504 WerFault.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\15057376400ddba044817a9e75b1707439ad2cb95be11425cccff6afb43bb079.exe"C:\Users\Admin\AppData\Local\Temp\15057376400ddba044817a9e75b1707439ad2cb95be11425cccff6afb43bb079.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 2642⤵
- Program crash
PID:4832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4504 -ip 45041⤵PID:2824