Analysis

  • max time kernel
    141s
  • max time network
    199s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2023, 00:15

General

  • Target

    33098b79f4fbe47f6196bfe823d41fa3.exe

  • Size

    12.3MB

  • MD5

    33098b79f4fbe47f6196bfe823d41fa3

  • SHA1

    4279c26e60b02fe4ac60485221052a049dc67da9

  • SHA256

    84279d15180e853b3ce2d6bc7249c070aa190b9dd563d38c1732c56ede3820bb

  • SHA512

    8c0bb8b8fa8765fbe4a11dbf6b0b26b80b07e0123978cbaced1431509db65a5e54b134e58b2bbb287481d057a1869db2e6d5ddb2d4feec23e23cdd0885d5b243

  • SSDEEP

    196608:lB/U7um1KQHQpf9PFC5Uz+IEx0WMydcC4hKTp3JPm+FARbIi2sMf5B:zU7Vo2QD4ij00WMychwve+mRb51g

Malware Config

Signatures

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33098b79f4fbe47f6196bfe823d41fa3.exe
    "C:\Users\Admin\AppData\Local\Temp\33098b79f4fbe47f6196bfe823d41fa3.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1356
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic BaseBoard get SerialNumber
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1584

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1356-0-0x0000000001CC0000-0x0000000001CC1000-memory.dmp

          Filesize

          4KB

        • memory/1356-1-0x0000000001CE0000-0x0000000001CE1000-memory.dmp

          Filesize

          4KB

        • memory/1356-4-0x00000000021B0000-0x00000000021B1000-memory.dmp

          Filesize

          4KB

        • memory/1356-3-0x0000000000400000-0x0000000001B4B000-memory.dmp

          Filesize

          23.3MB

        • memory/1356-5-0x00000000038E0000-0x00000000038E1000-memory.dmp

          Filesize

          4KB

        • memory/1356-2-0x00000000021A0000-0x00000000021A1000-memory.dmp

          Filesize

          4KB

        • memory/1356-6-0x00000000038F0000-0x00000000038F1000-memory.dmp

          Filesize

          4KB

        • memory/1356-7-0x0000000003900000-0x0000000003901000-memory.dmp

          Filesize

          4KB

        • memory/1356-8-0x0000000000400000-0x0000000001B4B000-memory.dmp

          Filesize

          23.3MB

        • memory/1356-9-0x0000000003910000-0x0000000003911000-memory.dmp

          Filesize

          4KB

        • memory/1356-15-0x0000000000400000-0x0000000001B4B000-memory.dmp

          Filesize

          23.3MB