Analysis
-
max time kernel
146s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 03:06
Behavioral task
behavioral1
Sample
01de2dce3653a274f83d8f396c12a2d8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01de2dce3653a274f83d8f396c12a2d8.exe
Resource
win10v2004-20231215-en
General
-
Target
01de2dce3653a274f83d8f396c12a2d8.exe
-
Size
232KB
-
MD5
01de2dce3653a274f83d8f396c12a2d8
-
SHA1
e9e3e2f8794a97211c09e529986f5f1609c9d742
-
SHA256
605bee9c859d3e7e47490ce788cf7b05bf27a2bcd3e42d7745a52cbfe1bb0e54
-
SHA512
6888582e05882a4894e6c21b72b09e8476034757394878b8a4e1dd011baa7bbbba1e50bd916518c219d1084d267e8501390b3af51b31e55d0e6db71bf3d40aa9
-
SSDEEP
6144:wmAyHeQ86BpSRgqMQQ3dFwCNpT7ERPDeU6v4+twoKCNz7l:M336BgiqMQQ3dFPDTUKUS4mKCNnl
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1520-0-0x0000000000400000-0x0000000000487000-memory.dmp upx behavioral2/memory/1520-1-0x0000000000400000-0x0000000000487000-memory.dmp upx -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\h: 01de2dce3653a274f83d8f396c12a2d8.exe File opened (read-only) \??\p: 01de2dce3653a274f83d8f396c12a2d8.exe File opened (read-only) \??\s: 01de2dce3653a274f83d8f396c12a2d8.exe File opened (read-only) \??\t: 01de2dce3653a274f83d8f396c12a2d8.exe File opened (read-only) \??\e: 01de2dce3653a274f83d8f396c12a2d8.exe File opened (read-only) \??\q: 01de2dce3653a274f83d8f396c12a2d8.exe File opened (read-only) \??\r: 01de2dce3653a274f83d8f396c12a2d8.exe File opened (read-only) \??\w: 01de2dce3653a274f83d8f396c12a2d8.exe File opened (read-only) \??\x: 01de2dce3653a274f83d8f396c12a2d8.exe File opened (read-only) \??\z: 01de2dce3653a274f83d8f396c12a2d8.exe File opened (read-only) \??\n: 01de2dce3653a274f83d8f396c12a2d8.exe File opened (read-only) \??\i: 01de2dce3653a274f83d8f396c12a2d8.exe File opened (read-only) \??\j: 01de2dce3653a274f83d8f396c12a2d8.exe File opened (read-only) \??\k: 01de2dce3653a274f83d8f396c12a2d8.exe File opened (read-only) \??\l: 01de2dce3653a274f83d8f396c12a2d8.exe File opened (read-only) \??\u: 01de2dce3653a274f83d8f396c12a2d8.exe File opened (read-only) \??\v: 01de2dce3653a274f83d8f396c12a2d8.exe File opened (read-only) \??\y: 01de2dce3653a274f83d8f396c12a2d8.exe File opened (read-only) \??\g: 01de2dce3653a274f83d8f396c12a2d8.exe File opened (read-only) \??\o: 01de2dce3653a274f83d8f396c12a2d8.exe File opened (read-only) \??\m: 01de2dce3653a274f83d8f396c12a2d8.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 01de2dce3653a274f83d8f396c12a2d8.exe