Analysis
-
max time kernel
0s -
max time network
88s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 23:55
Behavioral task
behavioral1
Sample
1b13df29d01f63059c5a14f619c1c5d4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1b13df29d01f63059c5a14f619c1c5d4.exe
Resource
win10v2004-20231215-en
General
-
Target
1b13df29d01f63059c5a14f619c1c5d4.exe
-
Size
241KB
-
MD5
1b13df29d01f63059c5a14f619c1c5d4
-
SHA1
9bc57b6c3a5ec6ca63c274a7ebfda0c95db2afeb
-
SHA256
09ec641392d544f5062d509cb2d0e5409b7f5034d407c307be411bcb289585c7
-
SHA512
af40dbcb98c3dad0c682569496c632c8af629e25cc7484ced96cdd4fac36370fa08c9f67c41a421169e7600e155d322533ea02c21b518f5eb6dfb9c3869b58f2
-
SSDEEP
6144:ykeENDvTSn2SV/GuhYdViC7X57+nMaZHWb0:yNEND/k/GLPX57+nj2b0
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1944-0-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/1944-11-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/1944-12-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/1944-13-0x0000000000400000-0x0000000000489000-memory.dmp upx -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\i: 1b13df29d01f63059c5a14f619c1c5d4.exe File opened (read-only) \??\s: 1b13df29d01f63059c5a14f619c1c5d4.exe File opened (read-only) \??\u: 1b13df29d01f63059c5a14f619c1c5d4.exe File opened (read-only) \??\w: 1b13df29d01f63059c5a14f619c1c5d4.exe File opened (read-only) \??\e: 1b13df29d01f63059c5a14f619c1c5d4.exe File opened (read-only) \??\m: 1b13df29d01f63059c5a14f619c1c5d4.exe File opened (read-only) \??\o: 1b13df29d01f63059c5a14f619c1c5d4.exe File opened (read-only) \??\y: 1b13df29d01f63059c5a14f619c1c5d4.exe File opened (read-only) \??\j: 1b13df29d01f63059c5a14f619c1c5d4.exe File opened (read-only) \??\p: 1b13df29d01f63059c5a14f619c1c5d4.exe File opened (read-only) \??\x: 1b13df29d01f63059c5a14f619c1c5d4.exe File opened (read-only) \??\n: 1b13df29d01f63059c5a14f619c1c5d4.exe File opened (read-only) \??\h: 1b13df29d01f63059c5a14f619c1c5d4.exe File opened (read-only) \??\k: 1b13df29d01f63059c5a14f619c1c5d4.exe File opened (read-only) \??\l: 1b13df29d01f63059c5a14f619c1c5d4.exe File opened (read-only) \??\q: 1b13df29d01f63059c5a14f619c1c5d4.exe File opened (read-only) \??\r: 1b13df29d01f63059c5a14f619c1c5d4.exe File opened (read-only) \??\t: 1b13df29d01f63059c5a14f619c1c5d4.exe File opened (read-only) \??\v: 1b13df29d01f63059c5a14f619c1c5d4.exe File opened (read-only) \??\g: 1b13df29d01f63059c5a14f619c1c5d4.exe File opened (read-only) \??\z: 1b13df29d01f63059c5a14f619c1c5d4.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 1b13df29d01f63059c5a14f619c1c5d4.exe