Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 09:50
Static task
static1
Behavioral task
behavioral1
Sample
14f113459aabc3fee23e0bcb1cf1c335.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14f113459aabc3fee23e0bcb1cf1c335.exe
Resource
win10v2004-20231215-en
General
-
Target
14f113459aabc3fee23e0bcb1cf1c335.exe
-
Size
724KB
-
MD5
14f113459aabc3fee23e0bcb1cf1c335
-
SHA1
7475c02499946002da56d211201d70d4713252af
-
SHA256
d2cbc1809acc0c0aaaef3461a813b00bf9b2bf71d5e103bc2b0e6538ba62eebd
-
SHA512
a8abb34d9412bfacd7d096ca92feca5c1f6a61c5bb9ae0c01a20280163ecc6c4db94a02f8f7f76b147dd8e279ac8005a60cc48feecfba53e243dcabf46f98c5d
-
SSDEEP
12288:ft9v5UZIvX41qVb0xxOSDjld1nBRXjIjb9875JK2:ft9O4wm0xxOOrBRzdJK2
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\l: 14f113459aabc3fee23e0bcb1cf1c335.exe File opened (read-only) \??\r: 14f113459aabc3fee23e0bcb1cf1c335.exe File opened (read-only) \??\s: 14f113459aabc3fee23e0bcb1cf1c335.exe File opened (read-only) \??\u: 14f113459aabc3fee23e0bcb1cf1c335.exe File opened (read-only) \??\h: 14f113459aabc3fee23e0bcb1cf1c335.exe File opened (read-only) \??\i: 14f113459aabc3fee23e0bcb1cf1c335.exe File opened (read-only) \??\n: 14f113459aabc3fee23e0bcb1cf1c335.exe File opened (read-only) \??\p: 14f113459aabc3fee23e0bcb1cf1c335.exe File opened (read-only) \??\t: 14f113459aabc3fee23e0bcb1cf1c335.exe File opened (read-only) \??\y: 14f113459aabc3fee23e0bcb1cf1c335.exe File opened (read-only) \??\g: 14f113459aabc3fee23e0bcb1cf1c335.exe File opened (read-only) \??\j: 14f113459aabc3fee23e0bcb1cf1c335.exe File opened (read-only) \??\w: 14f113459aabc3fee23e0bcb1cf1c335.exe File opened (read-only) \??\x: 14f113459aabc3fee23e0bcb1cf1c335.exe File opened (read-only) \??\e: 14f113459aabc3fee23e0bcb1cf1c335.exe File opened (read-only) \??\k: 14f113459aabc3fee23e0bcb1cf1c335.exe File opened (read-only) \??\q: 14f113459aabc3fee23e0bcb1cf1c335.exe File opened (read-only) \??\v: 14f113459aabc3fee23e0bcb1cf1c335.exe File opened (read-only) \??\z: 14f113459aabc3fee23e0bcb1cf1c335.exe File opened (read-only) \??\m: 14f113459aabc3fee23e0bcb1cf1c335.exe File opened (read-only) \??\o: 14f113459aabc3fee23e0bcb1cf1c335.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 14f113459aabc3fee23e0bcb1cf1c335.exe