Analysis
-
max time kernel
82s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 16:30
Static task
static1
Behavioral task
behavioral1
Sample
7ccec09c75d213eedffd5edb259cb942.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7ccec09c75d213eedffd5edb259cb942.exe
Resource
win10v2004-20231215-en
General
-
Target
7ccec09c75d213eedffd5edb259cb942.exe
-
Size
176KB
-
MD5
7ccec09c75d213eedffd5edb259cb942
-
SHA1
20133067d3741957bbeeee757c7964de866e65b0
-
SHA256
79d51dbc650f12a024d6719ebbf1e1e47d929e1ae1907228314a05b42bc594f4
-
SHA512
1d6ce16e292598e7bec95f48fc005a0c4473b6952ad62dbd6103977b3b35ac280b1db228d5349519c0c96968d2ec789330868a5c8455e642b002d498e6443ee9
-
SSDEEP
3072:LohiNDxUTYampOBs8TZffFqRvCoREG8GXfYFWtEL11f3ilA:84dVa8IsSdfFIvJRaGXfkWt2f3
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\physicaldrive0 7ccec09c75d213eedffd5edb259cb942.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4832 7ccec09c75d213eedffd5edb259cb942.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 4832 7ccec09c75d213eedffd5edb259cb942.exe