Analysis
-
max time kernel
137s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 02:35
Behavioral task
behavioral1
Sample
0bd87294b3e9f5dfc49c1832b7f1467f.exe
Resource
win7-20231215-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
0bd87294b3e9f5dfc49c1832b7f1467f.exe
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
0bd87294b3e9f5dfc49c1832b7f1467f.exe
-
Size
12.3MB
-
MD5
0bd87294b3e9f5dfc49c1832b7f1467f
-
SHA1
67fefb2a6c9a7350e61569f5f4629d3721ed560f
-
SHA256
2c72cccf34bb6c104431aae4a0701973140a606bd5ce40df974a882178d41e1a
-
SHA512
390f54a413efae4da318f83af044009fbaaff1556fd8ecead919c098d34c9dd4b26d8c21a5d28dcedf1dbfbac9da79a9e084fe09cbb819e62ff65fe1aa2b05a5
-
SSDEEP
196608:HMY190iX7wRemauWzV8luMnQrW+nEhA7DiLDRLCvPfeaeltHJpiXYWPnbm5y:b190jRemQzn8htDRucnp7WPn1
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4808-0-0x0000000000400000-0x0000000001B5A000-memory.dmp vmprotect behavioral2/memory/4808-9-0x0000000000400000-0x0000000001B5A000-memory.dmp vmprotect behavioral2/memory/4808-14-0x0000000000400000-0x0000000001B5A000-memory.dmp vmprotect -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 0bd87294b3e9f5dfc49c1832b7f1467f.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4808 0bd87294b3e9f5dfc49c1832b7f1467f.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4808 0bd87294b3e9f5dfc49c1832b7f1467f.exe 4808 0bd87294b3e9f5dfc49c1832b7f1467f.exe 4808 0bd87294b3e9f5dfc49c1832b7f1467f.exe 4808 0bd87294b3e9f5dfc49c1832b7f1467f.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2796 wmic.exe Token: SeSecurityPrivilege 2796 wmic.exe Token: SeTakeOwnershipPrivilege 2796 wmic.exe Token: SeLoadDriverPrivilege 2796 wmic.exe Token: SeSystemProfilePrivilege 2796 wmic.exe Token: SeSystemtimePrivilege 2796 wmic.exe Token: SeProfSingleProcessPrivilege 2796 wmic.exe Token: SeIncBasePriorityPrivilege 2796 wmic.exe Token: SeCreatePagefilePrivilege 2796 wmic.exe Token: SeBackupPrivilege 2796 wmic.exe Token: SeRestorePrivilege 2796 wmic.exe Token: SeShutdownPrivilege 2796 wmic.exe Token: SeDebugPrivilege 2796 wmic.exe Token: SeSystemEnvironmentPrivilege 2796 wmic.exe Token: SeRemoteShutdownPrivilege 2796 wmic.exe Token: SeUndockPrivilege 2796 wmic.exe Token: SeManageVolumePrivilege 2796 wmic.exe Token: 33 2796 wmic.exe Token: 34 2796 wmic.exe Token: 35 2796 wmic.exe Token: 36 2796 wmic.exe Token: SeIncreaseQuotaPrivilege 2796 wmic.exe Token: SeSecurityPrivilege 2796 wmic.exe Token: SeTakeOwnershipPrivilege 2796 wmic.exe Token: SeLoadDriverPrivilege 2796 wmic.exe Token: SeSystemProfilePrivilege 2796 wmic.exe Token: SeSystemtimePrivilege 2796 wmic.exe Token: SeProfSingleProcessPrivilege 2796 wmic.exe Token: SeIncBasePriorityPrivilege 2796 wmic.exe Token: SeCreatePagefilePrivilege 2796 wmic.exe Token: SeBackupPrivilege 2796 wmic.exe Token: SeRestorePrivilege 2796 wmic.exe Token: SeShutdownPrivilege 2796 wmic.exe Token: SeDebugPrivilege 2796 wmic.exe Token: SeSystemEnvironmentPrivilege 2796 wmic.exe Token: SeRemoteShutdownPrivilege 2796 wmic.exe Token: SeUndockPrivilege 2796 wmic.exe Token: SeManageVolumePrivilege 2796 wmic.exe Token: 33 2796 wmic.exe Token: 34 2796 wmic.exe Token: 35 2796 wmic.exe Token: 36 2796 wmic.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4808 0bd87294b3e9f5dfc49c1832b7f1467f.exe 4808 0bd87294b3e9f5dfc49c1832b7f1467f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4808 wrote to memory of 2796 4808 0bd87294b3e9f5dfc49c1832b7f1467f.exe 95 PID 4808 wrote to memory of 2796 4808 0bd87294b3e9f5dfc49c1832b7f1467f.exe 95 PID 4808 wrote to memory of 2796 4808 0bd87294b3e9f5dfc49c1832b7f1467f.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bd87294b3e9f5dfc49c1832b7f1467f.exe"C:\Users\Admin\AppData\Local\Temp\0bd87294b3e9f5dfc49c1832b7f1467f.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic BaseBoard get SerialNumber2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2796
-