Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 04:22
Behavioral task
behavioral1
Sample
27f86d2306567c6c59f914a0b71e9680.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
27f86d2306567c6c59f914a0b71e9680.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
27f86d2306567c6c59f914a0b71e9680.exe
-
Size
12.4MB
-
MD5
27f86d2306567c6c59f914a0b71e9680
-
SHA1
01645c4b66427d48a8d773b16f632627c90b3a55
-
SHA256
fd51bcb1981f0d34b10371ab37113bffea76780690e8ffd891a3ba0e14a1b82c
-
SHA512
dec1c467685a6a65c2465b6127e48c4fc5fcaa1c9e2cb977aff3e41536f82e14c0382e16e2b9398d66bcd012d41ebaec210ab83f69cc374a971a694f083a5a5c
-
SSDEEP
393216:sSttl3FatYic7G3XXAwW+jDo2mYXAZq5VUNWgvL:sS/l1p5aHXAeDofe6BQgvL
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1268-2-0x0000000000400000-0x0000000001B6A000-memory.dmp vmprotect behavioral1/memory/1268-5-0x0000000000400000-0x0000000001B6A000-memory.dmp vmprotect behavioral1/memory/1268-48-0x0000000000400000-0x0000000001B6A000-memory.dmp vmprotect behavioral1/memory/1268-49-0x0000000000400000-0x0000000001B6A000-memory.dmp vmprotect -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 27f86d2306567c6c59f914a0b71e9680.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1268 27f86d2306567c6c59f914a0b71e9680.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1268 27f86d2306567c6c59f914a0b71e9680.exe 1268 27f86d2306567c6c59f914a0b71e9680.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2696 wmic.exe Token: SeSecurityPrivilege 2696 wmic.exe Token: SeTakeOwnershipPrivilege 2696 wmic.exe Token: SeLoadDriverPrivilege 2696 wmic.exe Token: SeSystemProfilePrivilege 2696 wmic.exe Token: SeSystemtimePrivilege 2696 wmic.exe Token: SeProfSingleProcessPrivilege 2696 wmic.exe Token: SeIncBasePriorityPrivilege 2696 wmic.exe Token: SeCreatePagefilePrivilege 2696 wmic.exe Token: SeBackupPrivilege 2696 wmic.exe Token: SeRestorePrivilege 2696 wmic.exe Token: SeShutdownPrivilege 2696 wmic.exe Token: SeDebugPrivilege 2696 wmic.exe Token: SeSystemEnvironmentPrivilege 2696 wmic.exe Token: SeRemoteShutdownPrivilege 2696 wmic.exe Token: SeUndockPrivilege 2696 wmic.exe Token: SeManageVolumePrivilege 2696 wmic.exe Token: 33 2696 wmic.exe Token: 34 2696 wmic.exe Token: 35 2696 wmic.exe Token: SeIncreaseQuotaPrivilege 2696 wmic.exe Token: SeSecurityPrivilege 2696 wmic.exe Token: SeTakeOwnershipPrivilege 2696 wmic.exe Token: SeLoadDriverPrivilege 2696 wmic.exe Token: SeSystemProfilePrivilege 2696 wmic.exe Token: SeSystemtimePrivilege 2696 wmic.exe Token: SeProfSingleProcessPrivilege 2696 wmic.exe Token: SeIncBasePriorityPrivilege 2696 wmic.exe Token: SeCreatePagefilePrivilege 2696 wmic.exe Token: SeBackupPrivilege 2696 wmic.exe Token: SeRestorePrivilege 2696 wmic.exe Token: SeShutdownPrivilege 2696 wmic.exe Token: SeDebugPrivilege 2696 wmic.exe Token: SeSystemEnvironmentPrivilege 2696 wmic.exe Token: SeRemoteShutdownPrivilege 2696 wmic.exe Token: SeUndockPrivilege 2696 wmic.exe Token: SeManageVolumePrivilege 2696 wmic.exe Token: 33 2696 wmic.exe Token: 34 2696 wmic.exe Token: 35 2696 wmic.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1268 27f86d2306567c6c59f914a0b71e9680.exe 1268 27f86d2306567c6c59f914a0b71e9680.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1268 wrote to memory of 2696 1268 27f86d2306567c6c59f914a0b71e9680.exe 29 PID 1268 wrote to memory of 2696 1268 27f86d2306567c6c59f914a0b71e9680.exe 29 PID 1268 wrote to memory of 2696 1268 27f86d2306567c6c59f914a0b71e9680.exe 29 PID 1268 wrote to memory of 2696 1268 27f86d2306567c6c59f914a0b71e9680.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\27f86d2306567c6c59f914a0b71e9680.exe"C:\Users\Admin\AppData\Local\Temp\27f86d2306567c6c59f914a0b71e9680.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic BaseBoard get SerialNumber2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2696
-