Analysis
-
max time kernel
9s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 17:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2f4dc15ad94cbf5e13c7ae058aea7130.exe
Resource
win7-20231215-en
windows7-x64
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
2f4dc15ad94cbf5e13c7ae058aea7130.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
2f4dc15ad94cbf5e13c7ae058aea7130.exe
-
Size
256KB
-
MD5
2f4dc15ad94cbf5e13c7ae058aea7130
-
SHA1
5900401247344abdcda7356e6b8789eae27bb085
-
SHA256
60f6639462ae4ba06b4df5d707835d322c6b830d95bb3ee247ee489a2eef30af
-
SHA512
43ba59942fb43ed074dc828a3d45cf6d5bef868b8927dbfbbf080db4341ca47cb6e11541b03127f50d81bfeb6714dcf161fe5250e2f1fdef37d56a631df140cc
-
SSDEEP
6144:9BO6+sNAi9KBPKXFlR4RLsHqIJEIy6do4VChvf:PosNL9sKVf4ZsKIJEIy6do4VChvf
Score
6/10
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 2f4dc15ad94cbf5e13c7ae058aea7130.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2244 set thread context of 1052 2244 2f4dc15ad94cbf5e13c7ae058aea7130.exe 62 PID 1052 set thread context of 1080 1052 2f4dc15ad94cbf5e13c7ae058aea7130.exe 61 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1080 2f4dc15ad94cbf5e13c7ae058aea7130.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2244 2f4dc15ad94cbf5e13c7ae058aea7130.exe 1052 2f4dc15ad94cbf5e13c7ae058aea7130.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2244 wrote to memory of 1052 2244 2f4dc15ad94cbf5e13c7ae058aea7130.exe 62 PID 2244 wrote to memory of 1052 2244 2f4dc15ad94cbf5e13c7ae058aea7130.exe 62 PID 2244 wrote to memory of 1052 2244 2f4dc15ad94cbf5e13c7ae058aea7130.exe 62 PID 2244 wrote to memory of 1052 2244 2f4dc15ad94cbf5e13c7ae058aea7130.exe 62 PID 2244 wrote to memory of 1052 2244 2f4dc15ad94cbf5e13c7ae058aea7130.exe 62 PID 2244 wrote to memory of 1052 2244 2f4dc15ad94cbf5e13c7ae058aea7130.exe 62 PID 2244 wrote to memory of 1052 2244 2f4dc15ad94cbf5e13c7ae058aea7130.exe 62 PID 2244 wrote to memory of 1052 2244 2f4dc15ad94cbf5e13c7ae058aea7130.exe 62 PID 1052 wrote to memory of 1080 1052 2f4dc15ad94cbf5e13c7ae058aea7130.exe 61 PID 1052 wrote to memory of 1080 1052 2f4dc15ad94cbf5e13c7ae058aea7130.exe 61 PID 1052 wrote to memory of 1080 1052 2f4dc15ad94cbf5e13c7ae058aea7130.exe 61 PID 1052 wrote to memory of 1080 1052 2f4dc15ad94cbf5e13c7ae058aea7130.exe 61 PID 1052 wrote to memory of 1080 1052 2f4dc15ad94cbf5e13c7ae058aea7130.exe 61 PID 1052 wrote to memory of 1080 1052 2f4dc15ad94cbf5e13c7ae058aea7130.exe 61 PID 1052 wrote to memory of 1080 1052 2f4dc15ad94cbf5e13c7ae058aea7130.exe 61 PID 1052 wrote to memory of 1080 1052 2f4dc15ad94cbf5e13c7ae058aea7130.exe 61 PID 1052 wrote to memory of 1080 1052 2f4dc15ad94cbf5e13c7ae058aea7130.exe 61 PID 1080 wrote to memory of 2464 1080 2f4dc15ad94cbf5e13c7ae058aea7130.exe 95 PID 1080 wrote to memory of 2464 1080 2f4dc15ad94cbf5e13c7ae058aea7130.exe 95 PID 1080 wrote to memory of 2464 1080 2f4dc15ad94cbf5e13c7ae058aea7130.exe 95 PID 2464 wrote to memory of 2352 2464 iexplore.exe 96 PID 2464 wrote to memory of 2352 2464 iexplore.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f4dc15ad94cbf5e13c7ae058aea7130.exe"C:\Users\Admin\AppData\Local\Temp\2f4dc15ad94cbf5e13c7ae058aea7130.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\2f4dc15ad94cbf5e13c7ae058aea7130.exe"C:\Users\Admin\AppData\Local\Temp\2f4dc15ad94cbf5e13c7ae058aea7130.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1052
-
-
C:\Users\Admin\AppData\Local\Temp\2f4dc15ad94cbf5e13c7ae058aea7130.exe"C:\Users\Admin\AppData\Local\Temp\2f4dc15ad94cbf5e13c7ae058aea7130.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
PID:2352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:17410 /prefetch:24⤵PID:3264
-
-
-