Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 14:40
Static task
static1
Behavioral task
behavioral1
Sample
765339e2f2eacdd355c3e4b55e764722.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
765339e2f2eacdd355c3e4b55e764722.exe
Resource
win10v2004-20231215-en
General
-
Target
765339e2f2eacdd355c3e4b55e764722.exe
-
Size
725KB
-
MD5
765339e2f2eacdd355c3e4b55e764722
-
SHA1
cf944e3f0245fa99252c38a2631aefc3cce3a297
-
SHA256
24d1fd23badb281f229c7a7211981aa42b726298711c19275a583e3edb4be0a6
-
SHA512
bb789b29870e84dab9c7827caa29832b6558235b99b6c2aa193634c9911a0c9446fd5b82dda477f7731b407719fab863c2ff63fff87cc09718d046792cc8b382
-
SSDEEP
12288:Ft9v5UZIvX41qVb0xxOSDjld1RBRXjIjbIFvaR0l:Ft9O4wm0xxOOrvRDm0l
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\q: 765339e2f2eacdd355c3e4b55e764722.exe File opened (read-only) \??\r: 765339e2f2eacdd355c3e4b55e764722.exe File opened (read-only) \??\k: 765339e2f2eacdd355c3e4b55e764722.exe File opened (read-only) \??\l: 765339e2f2eacdd355c3e4b55e764722.exe File opened (read-only) \??\n: 765339e2f2eacdd355c3e4b55e764722.exe File opened (read-only) \??\p: 765339e2f2eacdd355c3e4b55e764722.exe File opened (read-only) \??\s: 765339e2f2eacdd355c3e4b55e764722.exe File opened (read-only) \??\w: 765339e2f2eacdd355c3e4b55e764722.exe File opened (read-only) \??\g: 765339e2f2eacdd355c3e4b55e764722.exe File opened (read-only) \??\i: 765339e2f2eacdd355c3e4b55e764722.exe File opened (read-only) \??\u: 765339e2f2eacdd355c3e4b55e764722.exe File opened (read-only) \??\y: 765339e2f2eacdd355c3e4b55e764722.exe File opened (read-only) \??\z: 765339e2f2eacdd355c3e4b55e764722.exe File opened (read-only) \??\j: 765339e2f2eacdd355c3e4b55e764722.exe File opened (read-only) \??\o: 765339e2f2eacdd355c3e4b55e764722.exe File opened (read-only) \??\m: 765339e2f2eacdd355c3e4b55e764722.exe File opened (read-only) \??\t: 765339e2f2eacdd355c3e4b55e764722.exe File opened (read-only) \??\v: 765339e2f2eacdd355c3e4b55e764722.exe File opened (read-only) \??\x: 765339e2f2eacdd355c3e4b55e764722.exe File opened (read-only) \??\e: 765339e2f2eacdd355c3e4b55e764722.exe File opened (read-only) \??\h: 765339e2f2eacdd355c3e4b55e764722.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 765339e2f2eacdd355c3e4b55e764722.exe