Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 04:21
Behavioral task
behavioral1
Sample
27f04af9e2439d69f75fbcfab5f47d84.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
27f04af9e2439d69f75fbcfab5f47d84.exe
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
27f04af9e2439d69f75fbcfab5f47d84.exe
-
Size
12.3MB
-
MD5
27f04af9e2439d69f75fbcfab5f47d84
-
SHA1
a9f190ed02cb933f119003bbe031f52a222dac1c
-
SHA256
c0293abefd2ee4e144a10062846ab8458f4a5b5b459ff8c886f518fe963eacb3
-
SHA512
0fc74465cac9f1d5cd326cc4f88e1d07ee387bb7c47b7a101fabbde85cb3e1110f17ab794b0f9198a622d292e3f4e4e70b579cdfdb69f10b552180bc20e73ed6
-
SSDEEP
393216:/Ji1nS3VSC0aQ79LY6bhhEVdn/264TbCioHuk:xISP0rBnkRECioHT
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3716-2-0x0000000000400000-0x0000000001B55000-memory.dmp vmprotect behavioral2/memory/3716-9-0x0000000000400000-0x0000000001B55000-memory.dmp vmprotect behavioral2/memory/3716-15-0x0000000000400000-0x0000000001B55000-memory.dmp vmprotect -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 27f04af9e2439d69f75fbcfab5f47d84.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3716 27f04af9e2439d69f75fbcfab5f47d84.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3716 27f04af9e2439d69f75fbcfab5f47d84.exe 3716 27f04af9e2439d69f75fbcfab5f47d84.exe 3716 27f04af9e2439d69f75fbcfab5f47d84.exe 3716 27f04af9e2439d69f75fbcfab5f47d84.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4612 wmic.exe Token: SeSecurityPrivilege 4612 wmic.exe Token: SeTakeOwnershipPrivilege 4612 wmic.exe Token: SeLoadDriverPrivilege 4612 wmic.exe Token: SeSystemProfilePrivilege 4612 wmic.exe Token: SeSystemtimePrivilege 4612 wmic.exe Token: SeProfSingleProcessPrivilege 4612 wmic.exe Token: SeIncBasePriorityPrivilege 4612 wmic.exe Token: SeCreatePagefilePrivilege 4612 wmic.exe Token: SeBackupPrivilege 4612 wmic.exe Token: SeRestorePrivilege 4612 wmic.exe Token: SeShutdownPrivilege 4612 wmic.exe Token: SeDebugPrivilege 4612 wmic.exe Token: SeSystemEnvironmentPrivilege 4612 wmic.exe Token: SeRemoteShutdownPrivilege 4612 wmic.exe Token: SeUndockPrivilege 4612 wmic.exe Token: SeManageVolumePrivilege 4612 wmic.exe Token: 33 4612 wmic.exe Token: 34 4612 wmic.exe Token: 35 4612 wmic.exe Token: 36 4612 wmic.exe Token: SeIncreaseQuotaPrivilege 4612 wmic.exe Token: SeSecurityPrivilege 4612 wmic.exe Token: SeTakeOwnershipPrivilege 4612 wmic.exe Token: SeLoadDriverPrivilege 4612 wmic.exe Token: SeSystemProfilePrivilege 4612 wmic.exe Token: SeSystemtimePrivilege 4612 wmic.exe Token: SeProfSingleProcessPrivilege 4612 wmic.exe Token: SeIncBasePriorityPrivilege 4612 wmic.exe Token: SeCreatePagefilePrivilege 4612 wmic.exe Token: SeBackupPrivilege 4612 wmic.exe Token: SeRestorePrivilege 4612 wmic.exe Token: SeShutdownPrivilege 4612 wmic.exe Token: SeDebugPrivilege 4612 wmic.exe Token: SeSystemEnvironmentPrivilege 4612 wmic.exe Token: SeRemoteShutdownPrivilege 4612 wmic.exe Token: SeUndockPrivilege 4612 wmic.exe Token: SeManageVolumePrivilege 4612 wmic.exe Token: 33 4612 wmic.exe Token: 34 4612 wmic.exe Token: 35 4612 wmic.exe Token: 36 4612 wmic.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3716 27f04af9e2439d69f75fbcfab5f47d84.exe 3716 27f04af9e2439d69f75fbcfab5f47d84.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3716 wrote to memory of 4612 3716 27f04af9e2439d69f75fbcfab5f47d84.exe 92 PID 3716 wrote to memory of 4612 3716 27f04af9e2439d69f75fbcfab5f47d84.exe 92 PID 3716 wrote to memory of 4612 3716 27f04af9e2439d69f75fbcfab5f47d84.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\27f04af9e2439d69f75fbcfab5f47d84.exe"C:\Users\Admin\AppData\Local\Temp\27f04af9e2439d69f75fbcfab5f47d84.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic BaseBoard get SerialNumber2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4612
-