Analysis
-
max time kernel
162s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 00:11
Static task
static1
Behavioral task
behavioral1
Sample
21367ab0971f2b99daaf5b3be5a761a5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
21367ab0971f2b99daaf5b3be5a761a5.exe
Resource
win10v2004-20231215-en
General
-
Target
21367ab0971f2b99daaf5b3be5a761a5.exe
-
Size
716KB
-
MD5
21367ab0971f2b99daaf5b3be5a761a5
-
SHA1
cef2c64df435053ff84495fb1f6c150fcf2aeda0
-
SHA256
0ab965596fbfbcc3bff0a9c7910fc41a898ff336fb557c1caac60fdd9426154f
-
SHA512
7f3aea17da428fbbf1b2841bb408ea4f3b426735e607542d1bfc125139a3bee86487df949c47d85214ce66e1af181ae13788aae25c6e8f53206676202a6797fa
-
SSDEEP
12288:+kmAqNhBrYvg6QiEDCyxDdy0iBRXjIjb/+C81l4kp:+N5Bv6QiEjJy08RqP81lRp
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\s: 21367ab0971f2b99daaf5b3be5a761a5.exe File opened (read-only) \??\x: 21367ab0971f2b99daaf5b3be5a761a5.exe File opened (read-only) \??\g: 21367ab0971f2b99daaf5b3be5a761a5.exe File opened (read-only) \??\k: 21367ab0971f2b99daaf5b3be5a761a5.exe File opened (read-only) \??\l: 21367ab0971f2b99daaf5b3be5a761a5.exe File opened (read-only) \??\n: 21367ab0971f2b99daaf5b3be5a761a5.exe File opened (read-only) \??\p: 21367ab0971f2b99daaf5b3be5a761a5.exe File opened (read-only) \??\z: 21367ab0971f2b99daaf5b3be5a761a5.exe File opened (read-only) \??\h: 21367ab0971f2b99daaf5b3be5a761a5.exe File opened (read-only) \??\j: 21367ab0971f2b99daaf5b3be5a761a5.exe File opened (read-only) \??\q: 21367ab0971f2b99daaf5b3be5a761a5.exe File opened (read-only) \??\u: 21367ab0971f2b99daaf5b3be5a761a5.exe File opened (read-only) \??\y: 21367ab0971f2b99daaf5b3be5a761a5.exe File opened (read-only) \??\e: 21367ab0971f2b99daaf5b3be5a761a5.exe File opened (read-only) \??\r: 21367ab0971f2b99daaf5b3be5a761a5.exe File opened (read-only) \??\w: 21367ab0971f2b99daaf5b3be5a761a5.exe File opened (read-only) \??\i: 21367ab0971f2b99daaf5b3be5a761a5.exe File opened (read-only) \??\m: 21367ab0971f2b99daaf5b3be5a761a5.exe File opened (read-only) \??\o: 21367ab0971f2b99daaf5b3be5a761a5.exe File opened (read-only) \??\t: 21367ab0971f2b99daaf5b3be5a761a5.exe File opened (read-only) \??\v: 21367ab0971f2b99daaf5b3be5a761a5.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 21367ab0971f2b99daaf5b3be5a761a5.exe