Analysis
-
max time kernel
241s -
max time network
270s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 22:40
Static task
static1
Behavioral task
behavioral1
Sample
fd6c293c6d2491b33cc7b8d567a74f40.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fd6c293c6d2491b33cc7b8d567a74f40.exe
Resource
win10v2004-20231215-en
General
-
Target
fd6c293c6d2491b33cc7b8d567a74f40.exe
-
Size
502KB
-
MD5
fd6c293c6d2491b33cc7b8d567a74f40
-
SHA1
ae4fbfda9330455dbd2a050024c471ed52c0a646
-
SHA256
4580ed75e12dab2ffb87d5d4631d4c9f9b01ea4d4a1a31657f970df5fe4e49ba
-
SHA512
286942290f13f932614a53c16b7e5dd6a21d6d09b387ae558e2c493442e7a7f93936ebb03da3e0777f56f0309cadb9dac415f0dc534986e9b2918f75749d5d49
-
SSDEEP
12288:ndrajxZ5awl7DW/HgoWHBXhZLqh0nUHtiK7:na7DWIXGhCUHl7
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\h: fd6c293c6d2491b33cc7b8d567a74f40.exe File opened (read-only) \??\i: fd6c293c6d2491b33cc7b8d567a74f40.exe File opened (read-only) \??\k: fd6c293c6d2491b33cc7b8d567a74f40.exe File opened (read-only) \??\l: fd6c293c6d2491b33cc7b8d567a74f40.exe File opened (read-only) \??\n: fd6c293c6d2491b33cc7b8d567a74f40.exe File opened (read-only) \??\q: fd6c293c6d2491b33cc7b8d567a74f40.exe File opened (read-only) \??\u: fd6c293c6d2491b33cc7b8d567a74f40.exe File opened (read-only) \??\x: fd6c293c6d2491b33cc7b8d567a74f40.exe File opened (read-only) \??\z: fd6c293c6d2491b33cc7b8d567a74f40.exe File opened (read-only) \??\e: fd6c293c6d2491b33cc7b8d567a74f40.exe File opened (read-only) \??\j: fd6c293c6d2491b33cc7b8d567a74f40.exe File opened (read-only) \??\m: fd6c293c6d2491b33cc7b8d567a74f40.exe File opened (read-only) \??\o: fd6c293c6d2491b33cc7b8d567a74f40.exe File opened (read-only) \??\r: fd6c293c6d2491b33cc7b8d567a74f40.exe File opened (read-only) \??\g: fd6c293c6d2491b33cc7b8d567a74f40.exe File opened (read-only) \??\p: fd6c293c6d2491b33cc7b8d567a74f40.exe File opened (read-only) \??\s: fd6c293c6d2491b33cc7b8d567a74f40.exe File opened (read-only) \??\t: fd6c293c6d2491b33cc7b8d567a74f40.exe File opened (read-only) \??\v: fd6c293c6d2491b33cc7b8d567a74f40.exe File opened (read-only) \??\w: fd6c293c6d2491b33cc7b8d567a74f40.exe File opened (read-only) \??\y: fd6c293c6d2491b33cc7b8d567a74f40.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 fd6c293c6d2491b33cc7b8d567a74f40.exe