Analysis
-
max time kernel
2s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 07:06
Behavioral task
behavioral1
Sample
0d9c24b020c8ae2926b74c0bafbc8183.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
0d9c24b020c8ae2926b74c0bafbc8183.exe
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
0d9c24b020c8ae2926b74c0bafbc8183.exe
-
Size
12.3MB
-
MD5
0d9c24b020c8ae2926b74c0bafbc8183
-
SHA1
2d5dc9ec9b816938d21df20a8f8aa606dc281f5a
-
SHA256
99db95c29b120854fcb093b3574ea8d13644908a0788e6b844902d75504489f4
-
SHA512
cabd1a34247822cf44401745686ea891214a0301d34961a891f8a5096f0fdc83f74a6d917d4ebaea12589ef407afdaa1f6d0b5bd4a123c6064cd010bfb490176
-
SSDEEP
196608:E6DmGKcfYc4yGxRSK1ukJ35FXXBq7fxOHND/CJNj+NqHPHZOxFbgmnJ2msmH9IrI:j19xa2kl51W5OteCNqHP5UbgEsrD0oi
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4732-5-0x0000000000400000-0x0000000001B45000-memory.dmp vmprotect behavioral2/memory/4732-10-0x0000000000400000-0x0000000001B45000-memory.dmp vmprotect behavioral2/memory/4732-15-0x0000000000400000-0x0000000001B45000-memory.dmp vmprotect -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 0d9c24b020c8ae2926b74c0bafbc8183.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4732 0d9c24b020c8ae2926b74c0bafbc8183.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4732 0d9c24b020c8ae2926b74c0bafbc8183.exe 4732 0d9c24b020c8ae2926b74c0bafbc8183.exe 4732 0d9c24b020c8ae2926b74c0bafbc8183.exe 4732 0d9c24b020c8ae2926b74c0bafbc8183.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 5072 wmic.exe Token: SeSecurityPrivilege 5072 wmic.exe Token: SeTakeOwnershipPrivilege 5072 wmic.exe Token: SeLoadDriverPrivilege 5072 wmic.exe Token: SeSystemProfilePrivilege 5072 wmic.exe Token: SeSystemtimePrivilege 5072 wmic.exe Token: SeProfSingleProcessPrivilege 5072 wmic.exe Token: SeIncBasePriorityPrivilege 5072 wmic.exe Token: SeCreatePagefilePrivilege 5072 wmic.exe Token: SeBackupPrivilege 5072 wmic.exe Token: SeRestorePrivilege 5072 wmic.exe Token: SeShutdownPrivilege 5072 wmic.exe Token: SeDebugPrivilege 5072 wmic.exe Token: SeSystemEnvironmentPrivilege 5072 wmic.exe Token: SeRemoteShutdownPrivilege 5072 wmic.exe Token: SeUndockPrivilege 5072 wmic.exe Token: SeManageVolumePrivilege 5072 wmic.exe Token: 33 5072 wmic.exe Token: 34 5072 wmic.exe Token: 35 5072 wmic.exe Token: 36 5072 wmic.exe Token: SeIncreaseQuotaPrivilege 5072 wmic.exe Token: SeSecurityPrivilege 5072 wmic.exe Token: SeTakeOwnershipPrivilege 5072 wmic.exe Token: SeLoadDriverPrivilege 5072 wmic.exe Token: SeSystemProfilePrivilege 5072 wmic.exe Token: SeSystemtimePrivilege 5072 wmic.exe Token: SeProfSingleProcessPrivilege 5072 wmic.exe Token: SeIncBasePriorityPrivilege 5072 wmic.exe Token: SeCreatePagefilePrivilege 5072 wmic.exe Token: SeBackupPrivilege 5072 wmic.exe Token: SeRestorePrivilege 5072 wmic.exe Token: SeShutdownPrivilege 5072 wmic.exe Token: SeDebugPrivilege 5072 wmic.exe Token: SeSystemEnvironmentPrivilege 5072 wmic.exe Token: SeRemoteShutdownPrivilege 5072 wmic.exe Token: SeUndockPrivilege 5072 wmic.exe Token: SeManageVolumePrivilege 5072 wmic.exe Token: 33 5072 wmic.exe Token: 34 5072 wmic.exe Token: 35 5072 wmic.exe Token: 36 5072 wmic.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4732 0d9c24b020c8ae2926b74c0bafbc8183.exe 4732 0d9c24b020c8ae2926b74c0bafbc8183.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4732 wrote to memory of 5072 4732 0d9c24b020c8ae2926b74c0bafbc8183.exe 48 PID 4732 wrote to memory of 5072 4732 0d9c24b020c8ae2926b74c0bafbc8183.exe 48 PID 4732 wrote to memory of 5072 4732 0d9c24b020c8ae2926b74c0bafbc8183.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d9c24b020c8ae2926b74c0bafbc8183.exe"C:\Users\Admin\AppData\Local\Temp\0d9c24b020c8ae2926b74c0bafbc8183.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic BaseBoard get SerialNumber2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5072
-