Analysis
-
max time kernel
144s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
1e0fdfa4f603c5a9950bad53e2bc6f0f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1e0fdfa4f603c5a9950bad53e2bc6f0f.exe
Resource
win10v2004-20231215-en
General
-
Target
1e0fdfa4f603c5a9950bad53e2bc6f0f.exe
-
Size
20KB
-
MD5
1e0fdfa4f603c5a9950bad53e2bc6f0f
-
SHA1
fd1788e34d98c6dd9797ceb86fad6935356ca75a
-
SHA256
a7eede27fa6e012b1d0b670ce2b2c59d743339c02d7b9747511f72fcfb0a1b30
-
SHA512
01e5d8f8acff929646f7d7b9fa45b07b351bd96b3481790f7c0f410b9f9de578bead7f85cff527959c892bac63af6f0f977f9ba333386686f1dd3bcd1c9bbeb3
-
SSDEEP
384:17EpFXYzDC9gW6zhYnGmMXjfOv1TUUVgaurMAUAyxUBv8jE+I:qHwDC36zhEMjfOv1TU8gaiNyxUBUj+
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 IEXPLORE.EXE -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4316 set thread context of 3300 4316 1e0fdfa4f603c5a9950bad53e2bc6f0f.exe 16 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3300 IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4316 1e0fdfa4f603c5a9950bad53e2bc6f0f.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4316 wrote to memory of 3300 4316 1e0fdfa4f603c5a9950bad53e2bc6f0f.exe 16 PID 4316 wrote to memory of 3300 4316 1e0fdfa4f603c5a9950bad53e2bc6f0f.exe 16 PID 4316 wrote to memory of 3300 4316 1e0fdfa4f603c5a9950bad53e2bc6f0f.exe 16 PID 4316 wrote to memory of 3300 4316 1e0fdfa4f603c5a9950bad53e2bc6f0f.exe 16 PID 4316 wrote to memory of 3300 4316 1e0fdfa4f603c5a9950bad53e2bc6f0f.exe 16 PID 4316 wrote to memory of 3300 4316 1e0fdfa4f603c5a9950bad53e2bc6f0f.exe 16 PID 4316 wrote to memory of 3300 4316 1e0fdfa4f603c5a9950bad53e2bc6f0f.exe 16
Processes
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
PID:3300
-
C:\Users\Admin\AppData\Local\Temp\1e0fdfa4f603c5a9950bad53e2bc6f0f.exe"C:\Users\Admin\AppData\Local\Temp\1e0fdfa4f603c5a9950bad53e2bc6f0f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4316