Analysis
-
max time kernel
138s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 13:23
Static task
static1
Behavioral task
behavioral1
Sample
19e1b6559760c8b689e01d78e14a382b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
19e1b6559760c8b689e01d78e14a382b.exe
Resource
win10v2004-20231215-en
General
-
Target
19e1b6559760c8b689e01d78e14a382b.exe
-
Size
727KB
-
MD5
19e1b6559760c8b689e01d78e14a382b
-
SHA1
9fc878bbf2723fbeea0c6f24c68e65ab0291b8fe
-
SHA256
208db39044940613e66aadfbc15561f2ac8e382c63827088a36efc2d3fa5129b
-
SHA512
8cd84d28f2e618739c9c2992919b4838d366be5493dd73c1b02cb2679515fee5fd406c0735e1b416da759c09aecefa6e50100438bf8abee610cb56658a2778d1
-
SSDEEP
12288:TwECaUglPnFsk7P0UahDyDT1IBRXjIjpdz8pLOwi:TwEC70qkgUahDuuRjpLOwi
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\y: 19e1b6559760c8b689e01d78e14a382b.exe File opened (read-only) \??\g: 19e1b6559760c8b689e01d78e14a382b.exe File opened (read-only) \??\j: 19e1b6559760c8b689e01d78e14a382b.exe File opened (read-only) \??\p: 19e1b6559760c8b689e01d78e14a382b.exe File opened (read-only) \??\x: 19e1b6559760c8b689e01d78e14a382b.exe File opened (read-only) \??\s: 19e1b6559760c8b689e01d78e14a382b.exe File opened (read-only) \??\h: 19e1b6559760c8b689e01d78e14a382b.exe File opened (read-only) \??\m: 19e1b6559760c8b689e01d78e14a382b.exe File opened (read-only) \??\q: 19e1b6559760c8b689e01d78e14a382b.exe File opened (read-only) \??\r: 19e1b6559760c8b689e01d78e14a382b.exe File opened (read-only) \??\u: 19e1b6559760c8b689e01d78e14a382b.exe File opened (read-only) \??\v: 19e1b6559760c8b689e01d78e14a382b.exe File opened (read-only) \??\w: 19e1b6559760c8b689e01d78e14a382b.exe File opened (read-only) \??\z: 19e1b6559760c8b689e01d78e14a382b.exe File opened (read-only) \??\e: 19e1b6559760c8b689e01d78e14a382b.exe File opened (read-only) \??\i: 19e1b6559760c8b689e01d78e14a382b.exe File opened (read-only) \??\l: 19e1b6559760c8b689e01d78e14a382b.exe File opened (read-only) \??\o: 19e1b6559760c8b689e01d78e14a382b.exe File opened (read-only) \??\k: 19e1b6559760c8b689e01d78e14a382b.exe File opened (read-only) \??\n: 19e1b6559760c8b689e01d78e14a382b.exe File opened (read-only) \??\t: 19e1b6559760c8b689e01d78e14a382b.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 19e1b6559760c8b689e01d78e14a382b.exe