Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2023 15:50
Static task
static1
Behavioral task
behavioral1
Sample
3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe
Resource
win10v2004-20231215-en
General
-
Target
3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe
-
Size
2.2MB
-
MD5
3de7d38d7bc57fb141aa0bdf209a0a99
-
SHA1
08d57904a63095b69ad94e8db40653e7db9c7cb2
-
SHA256
3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9
-
SHA512
5d3985bf781db4fb7aef26105f9083c1efe92ae2e2f350c308cf3becacc050fddc12ccfb403ce8030d9ec558e1c28bb9ae0ee90e199f0bdbd7474cfd9fab0bcd
-
SSDEEP
49152:gi39+084E6W4W8Vm/BhlbXesYxJIiXN8tPSc:f+HVb4W8QflKs2JzXN8N
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 796 ~~8387580194687823248.tmp.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 ~~8387580194687823248.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeBackupPrivilege 5052 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: SeRestorePrivilege 5052 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: 33 5052 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: SeIncBasePriorityPrivilege 5052 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: 33 5052 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: SeIncBasePriorityPrivilege 5052 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: SeBackupPrivilege 4576 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: SeRestorePrivilege 4576 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: 33 4576 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: SeIncBasePriorityPrivilege 4576 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: 33 5052 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: SeIncBasePriorityPrivilege 5052 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: 33 5052 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: SeIncBasePriorityPrivilege 5052 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: SeBackupPrivilege 3404 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: SeRestorePrivilege 3404 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: 33 3404 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe Token: SeIncBasePriorityPrivilege 3404 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 5052 wrote to memory of 4576 5052 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 88 PID 5052 wrote to memory of 4576 5052 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 88 PID 5052 wrote to memory of 4576 5052 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 88 PID 5052 wrote to memory of 796 5052 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 92 PID 5052 wrote to memory of 796 5052 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 92 PID 5052 wrote to memory of 796 5052 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 92 PID 5052 wrote to memory of 3404 5052 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 96 PID 5052 wrote to memory of 3404 5052 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 96 PID 5052 wrote to memory of 3404 5052 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 96 PID 3404 wrote to memory of 5044 3404 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 98 PID 3404 wrote to memory of 5044 3404 3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe"C:\Users\Admin\AppData\Local\Temp\3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exePECMD**pecmd-cmd* PUTF "C:\Users\Admin\AppData\Local\Temp\~~8387580194687823248.tmp.exe",,"C:\Users\Admin\AppData\Local\Temp\3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exe""#102|SCRIPT"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
C:\Users\Admin\AppData\Local\Temp\~~8387580194687823248.tmp.exe"C:\Users\Admin\AppData\Local\Temp\~~8387580194687823248.tmp.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:796
-
-
C:\Users\Admin\AppData\Local\Temp\3a62bc2534e0a819b4cffc92488429d94a1487fed14153f6f3ad647ed3ae53e9.exePECMD**pecmd-cmd* EXEC -wd:C: -hide cmd /c "C:\Users\Admin\AppData\Local\Temp\~7895713197673514593.cmd"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\SYSTEM32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\~7895713197673514593.cmd"3⤵PID:5044
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
404B
MD5dcaddc5185f725206b78a4f2fc2b5033
SHA1067d07546ce7d4112e24cb846f6d32ccb0fb57fe
SHA2565105d68d12ef56a7741457627fb9a14bda155413ef814a8525150b2a1015bdab
SHA51245a0e279e9092d68ab54786508b9c61780d249e2dea013e40e8b38dcbef181cb45fd83dec611e4b88a2cffb453a73c058ff38193e12662163de524b1d96beb19
-
Filesize
2.3MB
MD5012d5128843481184c499833b4db5d3d
SHA197a680cc901e56eda288b425f331e1a03e50645a
SHA256f3f6ae44a0adb797eb76d3346de180256b3eadf0876da0f627e4f632267f27eb
SHA5122c1ccfdc4c3ee56971b11bfd5a1912874fb26ccfd295775cf28852d39f3c8907446baad05e67dec687b1ac0729c1849f50c63fa684ec496952f143e927c7a6a3
-
Filesize
1.3MB
MD5307ec752c80596aa9ee9a6a50bba56ed
SHA1ac1ea809e592b509d27aa7b8ccb22a2e2e1c941f
SHA256a804988170213a389e807dedaf5387fb995ab3f4f467625a6deb01bda898cef1
SHA51290dbf5befb771f65bd08d0be40cb9d7d13df4d78345ee24e74321d1b95ec07a394e5cf3f079a4cbc1137ef10015e1ca71e8ef59d396f3f47779c582384c19357