Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-12-2023 15:50
Static task
static1
Behavioral task
behavioral1
Sample
3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe
Resource
win10v2004-20231215-en
General
-
Target
3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe
-
Size
2.2MB
-
MD5
3de7d38d7bc57fb141aa0bdf209a0a99
-
SHA1
08d57904a63095b69ad94e8db40653e7db9c7cb2
-
SHA256
3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9
-
SHA512
5d3985bf781db4fb7aef26105f9083c1efe92ae2e2f350c308cf3becacc050fddc12ccfb403ce8030d9ec558e1c28bb9ae0ee90e199f0bdbd7474cfd9fab0bcd
-
SSDEEP
49152:gi39+084E6W4W8Vm/BhlbXesYxJIiXN8tPSc:f+HVb4W8QflKs2JzXN8N
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2312 ~~1186375881052235639.tmp.exe -
Loads dropped DLL 1 IoCs
pid Process 2108 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 ~~1186375881052235639.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeBackupPrivilege 2108 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: SeRestorePrivilege 2108 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: 33 2108 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: SeIncBasePriorityPrivilege 2108 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: 33 2108 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: SeIncBasePriorityPrivilege 2108 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: SeBackupPrivilege 2916 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: SeRestorePrivilege 2916 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: 33 2916 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: SeIncBasePriorityPrivilege 2916 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: 33 2108 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: SeIncBasePriorityPrivilege 2108 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: 33 2108 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: SeIncBasePriorityPrivilege 2108 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: SeBackupPrivilege 3064 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: SeRestorePrivilege 3064 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: 33 3064 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: SeIncBasePriorityPrivilege 3064 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2916 2108 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 20 PID 2108 wrote to memory of 2916 2108 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 20 PID 2108 wrote to memory of 2916 2108 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 20 PID 2108 wrote to memory of 2916 2108 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 20 PID 2108 wrote to memory of 2312 2108 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 29 PID 2108 wrote to memory of 2312 2108 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 29 PID 2108 wrote to memory of 2312 2108 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 29 PID 2108 wrote to memory of 2312 2108 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 29 PID 2108 wrote to memory of 3064 2108 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 33 PID 2108 wrote to memory of 3064 2108 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 33 PID 2108 wrote to memory of 3064 2108 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 33 PID 2108 wrote to memory of 3064 2108 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 33 PID 3064 wrote to memory of 2072 3064 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 31 PID 3064 wrote to memory of 2072 3064 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 31 PID 3064 wrote to memory of 2072 3064 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 31 PID 3064 wrote to memory of 2072 3064 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe"C:\Users\Admin\AppData\Local\Temp\3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exePECMD**pecmd-cmd* PUTF "C:\Users\Admin\AppData\Local\Temp\~~1186375881052235639.tmp.exe",,"C:\Users\Admin\AppData\Local\Temp\3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe""#102|SCRIPT"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\~~1186375881052235639.tmp.exe"C:\Users\Admin\AppData\Local\Temp\~~1186375881052235639.tmp.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:2312
-
-
C:\Users\Admin\AppData\Local\Temp\3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exePECMD**pecmd-cmd* EXEC -wd:C: -hide cmd /c "C:\Users\Admin\AppData\Local\Temp\~7846608138979650493.cmd"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3064
-
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\~7846608138979650493.cmd"1⤵PID:2072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
404B
MD5b089ec33daf18abc9b3a7c368f0fc5e5
SHA1a8316f3cb5af2acb25cfb1826bbf86a696b67f20
SHA256bc5012c7b09e98879027d348c9f82410d41092c5fedf119e51c6bca7ad7f4fd7
SHA512b0a765b1fd4f03ae40640717e51f7576e4d99add93cedb3fb6fdedbf3128bb409dfdd58772bb47884c8697acdb009b1c0ae6da061348ef68df8d3fe0dc0b28be
-
Filesize
312KB
MD52ab0edb96104e7c85535ebb8f3ebde21
SHA19ebd416ff1e22c604ba9061ddd29e37434e348b9
SHA256608ce64b35ad24a55fa44fbd2059743f0a6ecac8235bb05a78a3c86e3d8274dc
SHA5123bb3803d49e462f501b5751ce5a92d2191846dc12db29910bf40d567cefbee6343d6c0e971f6053aa3c2d398b16054acd087d3a71d58df47dc8f4f39bc7516c6
-
Filesize
375KB
MD5963429e4a11f9ad35f16ffd1b087e75d
SHA12ba33f1d978e8750b83c601df88db9dbab4151ba
SHA256d5ad42348ae82e8a390742f88be066d331cc0ef77f4554bcff60aa791c799be9
SHA512019bd8cc63cd9dda08121b383f12aa4a9d1bbe179a6ecf9ce36b338c88b34d69b2c66e22f95ea3ee52eff18b9afe42f49978674281046a09e9dd714e52bf7ac9
-
Filesize
302KB
MD5fdf665415e7bcb9bc2d8f078de39f74b
SHA18d5ed39a18f3f2fcb759fcb0fc58ebef62b2218d
SHA256230473f690455e06a2068362e7cdf2a283c4c6ef0b88a6aed84ede39203ccc32
SHA5122ba49b955f107992378b77913fce002a413405c946f3d42c7ac6c6aa7448a4c92430b626df704991ddda7be7fb70b6459c5a606a1bab0fffc85a843f8476d728