Analysis
-
max time kernel
5s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 00:16
Behavioral task
behavioral1
Sample
1c44cf5069a3cce2891a7c09f60a23d4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1c44cf5069a3cce2891a7c09f60a23d4.exe
Resource
win10v2004-20231215-en
General
-
Target
1c44cf5069a3cce2891a7c09f60a23d4.exe
-
Size
241KB
-
MD5
1c44cf5069a3cce2891a7c09f60a23d4
-
SHA1
6a594099c8f2142c5eb95162088723485a588e89
-
SHA256
397764c101737103ef06b78ad1ab8fcf042d04c773d8f442162c714e65cb45cf
-
SHA512
acbd502ea5b7ba41acf19837f30f5fd80a4723ea86ee8066e4a1fb5535a046352644de4702cf5ce2c75c37228de7386cc1d67472192eed4ec0e9b5761137c2fd
-
SSDEEP
6144:fkeENDvTSn2SV/GuhYdViC7X57+nMQSW4tJW:fNEND/k/GLPX57+nfSW4tJW
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2224-0-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral1/memory/2224-61-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral1/memory/2224-62-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral1/memory/2224-67-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral1/memory/2224-69-0x0000000000400000-0x0000000000489000-memory.dmp upx -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\i: 1c44cf5069a3cce2891a7c09f60a23d4.exe File opened (read-only) \??\l: 1c44cf5069a3cce2891a7c09f60a23d4.exe File opened (read-only) \??\m: 1c44cf5069a3cce2891a7c09f60a23d4.exe File opened (read-only) \??\x: 1c44cf5069a3cce2891a7c09f60a23d4.exe File opened (read-only) \??\z: 1c44cf5069a3cce2891a7c09f60a23d4.exe File opened (read-only) \??\e: 1c44cf5069a3cce2891a7c09f60a23d4.exe File opened (read-only) \??\h: 1c44cf5069a3cce2891a7c09f60a23d4.exe File opened (read-only) \??\q: 1c44cf5069a3cce2891a7c09f60a23d4.exe File opened (read-only) \??\y: 1c44cf5069a3cce2891a7c09f60a23d4.exe File opened (read-only) \??\k: 1c44cf5069a3cce2891a7c09f60a23d4.exe File opened (read-only) \??\n: 1c44cf5069a3cce2891a7c09f60a23d4.exe File opened (read-only) \??\w: 1c44cf5069a3cce2891a7c09f60a23d4.exe File opened (read-only) \??\s: 1c44cf5069a3cce2891a7c09f60a23d4.exe File opened (read-only) \??\t: 1c44cf5069a3cce2891a7c09f60a23d4.exe File opened (read-only) \??\o: 1c44cf5069a3cce2891a7c09f60a23d4.exe File opened (read-only) \??\p: 1c44cf5069a3cce2891a7c09f60a23d4.exe File opened (read-only) \??\r: 1c44cf5069a3cce2891a7c09f60a23d4.exe File opened (read-only) \??\u: 1c44cf5069a3cce2891a7c09f60a23d4.exe File opened (read-only) \??\v: 1c44cf5069a3cce2891a7c09f60a23d4.exe File opened (read-only) \??\g: 1c44cf5069a3cce2891a7c09f60a23d4.exe File opened (read-only) \??\j: 1c44cf5069a3cce2891a7c09f60a23d4.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 1c44cf5069a3cce2891a7c09f60a23d4.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5f46d5b2423f00fb92e97c2e859ad2791
SHA1a37363995cb234152d576482a9b900007f6551e4
SHA25610ff9c13f9d7aa186f9d09e010640455569e86dbd9e1b34fb811011c0ed34c92
SHA512697886fa43e72ea31dadc5a7358ce895b5a29d7ed57a3d6d892e581f446a0a748547d6976b7e241719ccc84bd7c90906e45ed5b743f68f767fe7c39e3522cd71