Analysis
-
max time kernel
131s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 11:22
Behavioral task
behavioral1
Sample
6a75e174a3ca4e499401f2b39c398204.exe
Resource
win7-20231129-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
6a75e174a3ca4e499401f2b39c398204.exe
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
6a75e174a3ca4e499401f2b39c398204.exe
-
Size
12.3MB
-
MD5
6a75e174a3ca4e499401f2b39c398204
-
SHA1
225876282fe4b1d9dee6710ad8f758158b6ae57f
-
SHA256
b09df0d775637920dfa7598a16064ec812119f0a6600179e30ec2886caf94f0e
-
SHA512
62356ac9c612da3854fdd445b5d0fff759b2524dac04f93ac76b891ca9459abe09169644d56e863b5a9580d119e33bae914e64f15a3861e65a960555496d8d00
-
SSDEEP
196608:yhR/fgkeLrW8CY1U6ckR77HZFvnauTeGtWQCZtwTwUHVtg479hvtzQ4N5E:yhR/fgt6xDEXdnamhYNS51++9hZQ4k
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1168-2-0x0000000000400000-0x0000000001B34000-memory.dmp vmprotect behavioral2/memory/1168-9-0x0000000000400000-0x0000000001B34000-memory.dmp vmprotect behavioral2/memory/1168-15-0x0000000000400000-0x0000000001B34000-memory.dmp vmprotect -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 6a75e174a3ca4e499401f2b39c398204.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1168 6a75e174a3ca4e499401f2b39c398204.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1168 6a75e174a3ca4e499401f2b39c398204.exe 1168 6a75e174a3ca4e499401f2b39c398204.exe 1168 6a75e174a3ca4e499401f2b39c398204.exe 1168 6a75e174a3ca4e499401f2b39c398204.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3200 wmic.exe Token: SeSecurityPrivilege 3200 wmic.exe Token: SeTakeOwnershipPrivilege 3200 wmic.exe Token: SeLoadDriverPrivilege 3200 wmic.exe Token: SeSystemProfilePrivilege 3200 wmic.exe Token: SeSystemtimePrivilege 3200 wmic.exe Token: SeProfSingleProcessPrivilege 3200 wmic.exe Token: SeIncBasePriorityPrivilege 3200 wmic.exe Token: SeCreatePagefilePrivilege 3200 wmic.exe Token: SeBackupPrivilege 3200 wmic.exe Token: SeRestorePrivilege 3200 wmic.exe Token: SeShutdownPrivilege 3200 wmic.exe Token: SeDebugPrivilege 3200 wmic.exe Token: SeSystemEnvironmentPrivilege 3200 wmic.exe Token: SeRemoteShutdownPrivilege 3200 wmic.exe Token: SeUndockPrivilege 3200 wmic.exe Token: SeManageVolumePrivilege 3200 wmic.exe Token: 33 3200 wmic.exe Token: 34 3200 wmic.exe Token: 35 3200 wmic.exe Token: 36 3200 wmic.exe Token: SeIncreaseQuotaPrivilege 3200 wmic.exe Token: SeSecurityPrivilege 3200 wmic.exe Token: SeTakeOwnershipPrivilege 3200 wmic.exe Token: SeLoadDriverPrivilege 3200 wmic.exe Token: SeSystemProfilePrivilege 3200 wmic.exe Token: SeSystemtimePrivilege 3200 wmic.exe Token: SeProfSingleProcessPrivilege 3200 wmic.exe Token: SeIncBasePriorityPrivilege 3200 wmic.exe Token: SeCreatePagefilePrivilege 3200 wmic.exe Token: SeBackupPrivilege 3200 wmic.exe Token: SeRestorePrivilege 3200 wmic.exe Token: SeShutdownPrivilege 3200 wmic.exe Token: SeDebugPrivilege 3200 wmic.exe Token: SeSystemEnvironmentPrivilege 3200 wmic.exe Token: SeRemoteShutdownPrivilege 3200 wmic.exe Token: SeUndockPrivilege 3200 wmic.exe Token: SeManageVolumePrivilege 3200 wmic.exe Token: 33 3200 wmic.exe Token: 34 3200 wmic.exe Token: 35 3200 wmic.exe Token: 36 3200 wmic.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1168 6a75e174a3ca4e499401f2b39c398204.exe 1168 6a75e174a3ca4e499401f2b39c398204.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1168 wrote to memory of 3200 1168 6a75e174a3ca4e499401f2b39c398204.exe 90 PID 1168 wrote to memory of 3200 1168 6a75e174a3ca4e499401f2b39c398204.exe 90 PID 1168 wrote to memory of 3200 1168 6a75e174a3ca4e499401f2b39c398204.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a75e174a3ca4e499401f2b39c398204.exe"C:\Users\Admin\AppData\Local\Temp\6a75e174a3ca4e499401f2b39c398204.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic BaseBoard get SerialNumber2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3200
-