Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2023 11:51
Static task
static1
Behavioral task
behavioral1
Sample
2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe
Resource
win10v2004-20231023-en
General
-
Target
2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe
-
Size
6.4MB
-
MD5
b0922e40b8ed591cb46ed85f1f63e740
-
SHA1
264106417574edfe7cb6d6ea625e6667ff64ed29
-
SHA256
2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13
-
SHA512
a034f95485dfc9f44e9a469e59ab1100ff2c7f21a01d732b090de3cd8311aa480d3d30483fb52f921061516b61b321fb6d30ba88f7fae4f336c5e94e47bf3d22
-
SSDEEP
98304:/FE1KzAgvla8lJvjzcln+vUEjI7pclWSV7SxyqxrO:/EKzVvpvvclnDpeaO
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4160 2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe 4160 2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1308 wmic.exe Token: SeSecurityPrivilege 1308 wmic.exe Token: SeTakeOwnershipPrivilege 1308 wmic.exe Token: SeLoadDriverPrivilege 1308 wmic.exe Token: SeSystemProfilePrivilege 1308 wmic.exe Token: SeSystemtimePrivilege 1308 wmic.exe Token: SeProfSingleProcessPrivilege 1308 wmic.exe Token: SeIncBasePriorityPrivilege 1308 wmic.exe Token: SeCreatePagefilePrivilege 1308 wmic.exe Token: SeBackupPrivilege 1308 wmic.exe Token: SeRestorePrivilege 1308 wmic.exe Token: SeShutdownPrivilege 1308 wmic.exe Token: SeDebugPrivilege 1308 wmic.exe Token: SeSystemEnvironmentPrivilege 1308 wmic.exe Token: SeRemoteShutdownPrivilege 1308 wmic.exe Token: SeUndockPrivilege 1308 wmic.exe Token: SeManageVolumePrivilege 1308 wmic.exe Token: 33 1308 wmic.exe Token: 34 1308 wmic.exe Token: 35 1308 wmic.exe Token: 36 1308 wmic.exe Token: SeIncreaseQuotaPrivilege 1308 wmic.exe Token: SeSecurityPrivilege 1308 wmic.exe Token: SeTakeOwnershipPrivilege 1308 wmic.exe Token: SeLoadDriverPrivilege 1308 wmic.exe Token: SeSystemProfilePrivilege 1308 wmic.exe Token: SeSystemtimePrivilege 1308 wmic.exe Token: SeProfSingleProcessPrivilege 1308 wmic.exe Token: SeIncBasePriorityPrivilege 1308 wmic.exe Token: SeCreatePagefilePrivilege 1308 wmic.exe Token: SeBackupPrivilege 1308 wmic.exe Token: SeRestorePrivilege 1308 wmic.exe Token: SeShutdownPrivilege 1308 wmic.exe Token: SeDebugPrivilege 1308 wmic.exe Token: SeSystemEnvironmentPrivilege 1308 wmic.exe Token: SeRemoteShutdownPrivilege 1308 wmic.exe Token: SeUndockPrivilege 1308 wmic.exe Token: SeManageVolumePrivilege 1308 wmic.exe Token: 33 1308 wmic.exe Token: 34 1308 wmic.exe Token: 35 1308 wmic.exe Token: 36 1308 wmic.exe Token: SeIncreaseQuotaPrivilege 2480 wmic.exe Token: SeSecurityPrivilege 2480 wmic.exe Token: SeTakeOwnershipPrivilege 2480 wmic.exe Token: SeLoadDriverPrivilege 2480 wmic.exe Token: SeSystemProfilePrivilege 2480 wmic.exe Token: SeSystemtimePrivilege 2480 wmic.exe Token: SeProfSingleProcessPrivilege 2480 wmic.exe Token: SeIncBasePriorityPrivilege 2480 wmic.exe Token: SeCreatePagefilePrivilege 2480 wmic.exe Token: SeBackupPrivilege 2480 wmic.exe Token: SeRestorePrivilege 2480 wmic.exe Token: SeShutdownPrivilege 2480 wmic.exe Token: SeDebugPrivilege 2480 wmic.exe Token: SeSystemEnvironmentPrivilege 2480 wmic.exe Token: SeRemoteShutdownPrivilege 2480 wmic.exe Token: SeUndockPrivilege 2480 wmic.exe Token: SeManageVolumePrivilege 2480 wmic.exe Token: 33 2480 wmic.exe Token: 34 2480 wmic.exe Token: 35 2480 wmic.exe Token: 36 2480 wmic.exe Token: SeIncreaseQuotaPrivilege 2480 wmic.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4160 wrote to memory of 1308 4160 2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe 85 PID 4160 wrote to memory of 1308 4160 2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe 85 PID 4160 wrote to memory of 2480 4160 2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe 92 PID 4160 wrote to memory of 2480 4160 2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe"C:\Users\Admin\AppData\Local\Temp\2aca43ead199cfc9802663949cdbc4955e3f46960c6a5c38a5ebcb9df80a5b13.exe"1⤵
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\System32\Wbem\wmic.exewmic path Win32_ComputerSystem get HypervisorPresent2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
C:\Windows\System32\Wbem\wmic.exewmic BaseBoard get Manufacturer2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2480
-