Analysis
-
max time kernel
141s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 08:39
Behavioral task
behavioral1
Sample
12900ad825a26dce65c5b96dcbc9af84.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
12900ad825a26dce65c5b96dcbc9af84.exe
Resource
win10v2004-20231215-en
General
-
Target
12900ad825a26dce65c5b96dcbc9af84.exe
-
Size
202KB
-
MD5
12900ad825a26dce65c5b96dcbc9af84
-
SHA1
2496d5d3266b4ff041b243712ab87ed94de9ccf8
-
SHA256
87efb13349cb020a8cbb0d041f6318124014afa065011e4d924f1c04ec59b972
-
SHA512
9ba7a137888740356c4ca3c564d1359f71e48212179ed2ca8a70da769e38ecbaff89cb61c0e447f4014114991cbbe697be5eba933bf61dd1365ac79b50af60de
-
SSDEEP
6144:gHCTecfxmJ5TINDYwUi+pLTAxxNMIehlwxLECJ:cGxG5To8wUi4cxJehlegCJ
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1436-0-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/1436-17-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/1436-23-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/1436-26-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/1436-29-0x0000000000400000-0x0000000000477000-memory.dmp upx -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\q: 12900ad825a26dce65c5b96dcbc9af84.exe File opened (read-only) \??\w: 12900ad825a26dce65c5b96dcbc9af84.exe File opened (read-only) \??\x: 12900ad825a26dce65c5b96dcbc9af84.exe File opened (read-only) \??\g: 12900ad825a26dce65c5b96dcbc9af84.exe File opened (read-only) \??\j: 12900ad825a26dce65c5b96dcbc9af84.exe File opened (read-only) \??\n: 12900ad825a26dce65c5b96dcbc9af84.exe File opened (read-only) \??\m: 12900ad825a26dce65c5b96dcbc9af84.exe File opened (read-only) \??\p: 12900ad825a26dce65c5b96dcbc9af84.exe File opened (read-only) \??\t: 12900ad825a26dce65c5b96dcbc9af84.exe File opened (read-only) \??\y: 12900ad825a26dce65c5b96dcbc9af84.exe File opened (read-only) \??\e: 12900ad825a26dce65c5b96dcbc9af84.exe File opened (read-only) \??\i: 12900ad825a26dce65c5b96dcbc9af84.exe File opened (read-only) \??\l: 12900ad825a26dce65c5b96dcbc9af84.exe File opened (read-only) \??\o: 12900ad825a26dce65c5b96dcbc9af84.exe File opened (read-only) \??\v: 12900ad825a26dce65c5b96dcbc9af84.exe File opened (read-only) \??\s: 12900ad825a26dce65c5b96dcbc9af84.exe File opened (read-only) \??\u: 12900ad825a26dce65c5b96dcbc9af84.exe File opened (read-only) \??\z: 12900ad825a26dce65c5b96dcbc9af84.exe File opened (read-only) \??\h: 12900ad825a26dce65c5b96dcbc9af84.exe File opened (read-only) \??\k: 12900ad825a26dce65c5b96dcbc9af84.exe File opened (read-only) \??\r: 12900ad825a26dce65c5b96dcbc9af84.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 12900ad825a26dce65c5b96dcbc9af84.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\SAItest.txt 12900ad825a26dce65c5b96dcbc9af84.exe