Analysis
-
max time kernel
143s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 14:09
Static task
static1
Behavioral task
behavioral1
Sample
24560707122aa5e05c382e45da1bc9ba.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
24560707122aa5e05c382e45da1bc9ba.exe
Resource
win10v2004-20231215-en
General
-
Target
24560707122aa5e05c382e45da1bc9ba.exe
-
Size
727KB
-
MD5
24560707122aa5e05c382e45da1bc9ba
-
SHA1
d405a847ed9edaa868d531b7b83512459a2037f1
-
SHA256
a3b10487e010795de9ecad3ae19e253856e41c5e1ba721fbb9280a15b63f9d3c
-
SHA512
3c9c89c89a02a8a282c3c4c02c5f80fb598da56896ce86c0c61af3d4ea943cda8b5a21a0a205d3ee63ce976c9c1ff21d119fddd7787a032ba5c57fb7207c8fa2
-
SSDEEP
12288:rwECaUglPnFsk7P0UahDyDT1MBRXjIjpAMzlK1mkl:rwEC70qkgUahDuaRF6lKYM
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: 24560707122aa5e05c382e45da1bc9ba.exe File opened (read-only) \??\j: 24560707122aa5e05c382e45da1bc9ba.exe File opened (read-only) \??\v: 24560707122aa5e05c382e45da1bc9ba.exe File opened (read-only) \??\z: 24560707122aa5e05c382e45da1bc9ba.exe File opened (read-only) \??\o: 24560707122aa5e05c382e45da1bc9ba.exe File opened (read-only) \??\p: 24560707122aa5e05c382e45da1bc9ba.exe File opened (read-only) \??\q: 24560707122aa5e05c382e45da1bc9ba.exe File opened (read-only) \??\x: 24560707122aa5e05c382e45da1bc9ba.exe File opened (read-only) \??\y: 24560707122aa5e05c382e45da1bc9ba.exe File opened (read-only) \??\h: 24560707122aa5e05c382e45da1bc9ba.exe File opened (read-only) \??\l: 24560707122aa5e05c382e45da1bc9ba.exe File opened (read-only) \??\r: 24560707122aa5e05c382e45da1bc9ba.exe File opened (read-only) \??\s: 24560707122aa5e05c382e45da1bc9ba.exe File opened (read-only) \??\u: 24560707122aa5e05c382e45da1bc9ba.exe File opened (read-only) \??\w: 24560707122aa5e05c382e45da1bc9ba.exe File opened (read-only) \??\g: 24560707122aa5e05c382e45da1bc9ba.exe File opened (read-only) \??\i: 24560707122aa5e05c382e45da1bc9ba.exe File opened (read-only) \??\k: 24560707122aa5e05c382e45da1bc9ba.exe File opened (read-only) \??\m: 24560707122aa5e05c382e45da1bc9ba.exe File opened (read-only) \??\n: 24560707122aa5e05c382e45da1bc9ba.exe File opened (read-only) \??\t: 24560707122aa5e05c382e45da1bc9ba.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 24560707122aa5e05c382e45da1bc9ba.exe