Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
15/11/2023, 11:51
Static task
static1
Behavioral task
behavioral1
Sample
2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe
Resource
win10v2004-20231023-en
General
-
Target
2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe
-
Size
6.4MB
-
MD5
b0922e40b8ed591cb46ed85f1f63e740
-
SHA1
264106417574edfe7cb6d6ea625e6667ff64ed29
-
SHA256
2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13
-
SHA512
a034f95485dfc9f44e9a469e59ab1100ff2c7f21a01d732b090de3cd8311aa480d3d30483fb52f921061516b61b321fb6d30ba88f7fae4f336c5e94e47bf3d22
-
SSDEEP
98304:/FE1KzAgvla8lJvjzcln+vUEjI7pclWSV7SxyqxrO:/EKzVvpvvclnDpeaO
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 884 2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 584 wmic.exe Token: SeSecurityPrivilege 584 wmic.exe Token: SeTakeOwnershipPrivilege 584 wmic.exe Token: SeLoadDriverPrivilege 584 wmic.exe Token: SeSystemProfilePrivilege 584 wmic.exe Token: SeSystemtimePrivilege 584 wmic.exe Token: SeProfSingleProcessPrivilege 584 wmic.exe Token: SeIncBasePriorityPrivilege 584 wmic.exe Token: SeCreatePagefilePrivilege 584 wmic.exe Token: SeBackupPrivilege 584 wmic.exe Token: SeRestorePrivilege 584 wmic.exe Token: SeShutdownPrivilege 584 wmic.exe Token: SeDebugPrivilege 584 wmic.exe Token: SeSystemEnvironmentPrivilege 584 wmic.exe Token: SeRemoteShutdownPrivilege 584 wmic.exe Token: SeUndockPrivilege 584 wmic.exe Token: SeManageVolumePrivilege 584 wmic.exe Token: 33 584 wmic.exe Token: 34 584 wmic.exe Token: 35 584 wmic.exe Token: SeIncreaseQuotaPrivilege 584 wmic.exe Token: SeSecurityPrivilege 584 wmic.exe Token: SeTakeOwnershipPrivilege 584 wmic.exe Token: SeLoadDriverPrivilege 584 wmic.exe Token: SeSystemProfilePrivilege 584 wmic.exe Token: SeSystemtimePrivilege 584 wmic.exe Token: SeProfSingleProcessPrivilege 584 wmic.exe Token: SeIncBasePriorityPrivilege 584 wmic.exe Token: SeCreatePagefilePrivilege 584 wmic.exe Token: SeBackupPrivilege 584 wmic.exe Token: SeRestorePrivilege 584 wmic.exe Token: SeShutdownPrivilege 584 wmic.exe Token: SeDebugPrivilege 584 wmic.exe Token: SeSystemEnvironmentPrivilege 584 wmic.exe Token: SeRemoteShutdownPrivilege 584 wmic.exe Token: SeUndockPrivilege 584 wmic.exe Token: SeManageVolumePrivilege 584 wmic.exe Token: 33 584 wmic.exe Token: 34 584 wmic.exe Token: 35 584 wmic.exe Token: SeIncreaseQuotaPrivilege 2796 wmic.exe Token: SeSecurityPrivilege 2796 wmic.exe Token: SeTakeOwnershipPrivilege 2796 wmic.exe Token: SeLoadDriverPrivilege 2796 wmic.exe Token: SeSystemProfilePrivilege 2796 wmic.exe Token: SeSystemtimePrivilege 2796 wmic.exe Token: SeProfSingleProcessPrivilege 2796 wmic.exe Token: SeIncBasePriorityPrivilege 2796 wmic.exe Token: SeCreatePagefilePrivilege 2796 wmic.exe Token: SeBackupPrivilege 2796 wmic.exe Token: SeRestorePrivilege 2796 wmic.exe Token: SeShutdownPrivilege 2796 wmic.exe Token: SeDebugPrivilege 2796 wmic.exe Token: SeSystemEnvironmentPrivilege 2796 wmic.exe Token: SeRemoteShutdownPrivilege 2796 wmic.exe Token: SeUndockPrivilege 2796 wmic.exe Token: SeManageVolumePrivilege 2796 wmic.exe Token: 33 2796 wmic.exe Token: 34 2796 wmic.exe Token: 35 2796 wmic.exe Token: SeIncreaseQuotaPrivilege 2796 wmic.exe Token: SeSecurityPrivilege 2796 wmic.exe Token: SeTakeOwnershipPrivilege 2796 wmic.exe Token: SeLoadDriverPrivilege 2796 wmic.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 884 wrote to memory of 584 884 2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe 28 PID 884 wrote to memory of 584 884 2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe 28 PID 884 wrote to memory of 584 884 2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe 28 PID 884 wrote to memory of 2796 884 2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe 31 PID 884 wrote to memory of 2796 884 2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe 31 PID 884 wrote to memory of 2796 884 2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe"C:\Users\Admin\AppData\Local\Temp\2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe"1⤵
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\System32\Wbem\wmic.exewmic path Win32_ComputerSystem get HypervisorPresent2⤵
- Suspicious use of AdjustPrivilegeToken
PID:584
-
-
C:\Windows\System32\Wbem\wmic.exewmic BaseBoard get Manufacturer2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2796
-