Analysis
-
max time kernel
0s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 15:24
Behavioral task
behavioral1
Sample
2917e9ae126fee0277c544dec8274676.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2917e9ae126fee0277c544dec8274676.exe
Resource
win10v2004-20231215-en
General
-
Target
2917e9ae126fee0277c544dec8274676.exe
-
Size
228KB
-
MD5
2917e9ae126fee0277c544dec8274676
-
SHA1
1b7743d1779b0e8d0c4e7bd93cf04f0db0e3df14
-
SHA256
22b13848d3f286a551b2151a3c5b577f797cd5bf76e7e211b686055ed3de09d6
-
SHA512
35f194d8de6eaf85fbc4b4644156026c3f77c62e6a9504329ff1b6576c00577eb7ebd66251bac7ee5591ae708ed3b409de11363a2f11f073758ed9c64a811b91
-
SSDEEP
6144:osh1Z/s4BpAAx+NANgWB1zvj+5a+CG+xEe:osh1Z/Tb0WB43CGc
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1328-0-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral1/memory/1328-50-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral1/memory/1328-67-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral1/memory/1328-73-0x0000000000400000-0x0000000000488000-memory.dmp upx -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: 2917e9ae126fee0277c544dec8274676.exe File opened (read-only) \??\i: 2917e9ae126fee0277c544dec8274676.exe File opened (read-only) \??\l: 2917e9ae126fee0277c544dec8274676.exe File opened (read-only) \??\o: 2917e9ae126fee0277c544dec8274676.exe File opened (read-only) \??\p: 2917e9ae126fee0277c544dec8274676.exe File opened (read-only) \??\g: 2917e9ae126fee0277c544dec8274676.exe File opened (read-only) \??\h: 2917e9ae126fee0277c544dec8274676.exe File opened (read-only) \??\j: 2917e9ae126fee0277c544dec8274676.exe File opened (read-only) \??\m: 2917e9ae126fee0277c544dec8274676.exe File opened (read-only) \??\s: 2917e9ae126fee0277c544dec8274676.exe File opened (read-only) \??\y: 2917e9ae126fee0277c544dec8274676.exe File opened (read-only) \??\z: 2917e9ae126fee0277c544dec8274676.exe File opened (read-only) \??\r: 2917e9ae126fee0277c544dec8274676.exe File opened (read-only) \??\w: 2917e9ae126fee0277c544dec8274676.exe File opened (read-only) \??\k: 2917e9ae126fee0277c544dec8274676.exe File opened (read-only) \??\n: 2917e9ae126fee0277c544dec8274676.exe File opened (read-only) \??\q: 2917e9ae126fee0277c544dec8274676.exe File opened (read-only) \??\t: 2917e9ae126fee0277c544dec8274676.exe File opened (read-only) \??\u: 2917e9ae126fee0277c544dec8274676.exe File opened (read-only) \??\v: 2917e9ae126fee0277c544dec8274676.exe File opened (read-only) \??\x: 2917e9ae126fee0277c544dec8274676.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 2917e9ae126fee0277c544dec8274676.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5f723dcfdd5f5a7873d227cba2391d9c6
SHA163734748d6b5a85a7f12e3b58354442b54f2aaff
SHA256b0c2cba67e971e027a45d3ddd2673645c1f8b8040f1e285506b06bc2ac2d0807
SHA512f1fe727e9cf3f39dc3c5eadb0cd45803f0e749ae603945aa5c7300c0a235c6e69c41bc4fcff6cda9ee2595da82f33e3f731e63734e79dd6b42d4626c52e87fe1
-
Filesize
65KB
MD57d7cdd0e9f06f7d35ffa11ec10acac9d
SHA13ce82c17b98bd7a3010f9328e989065bc2d3bed9
SHA2566bec041e635fc41276931ad8d2ff14350b33da144540a062a811c4497f1e817b
SHA5122b03c82c9d4e31b01243704106f98740d322c0de20b0c5df5937b15bf4b11a51084b6ec3328e60bd4a4cd27030bb91de738f2df807df2c2c1fbbb3a115d201da