Analysis
-
max time kernel
148s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 05:27
Behavioral task
behavioral1
Sample
29fbfd47de180d7288e0f6abd2d73985.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
29fbfd47de180d7288e0f6abd2d73985.exe
Resource
win10v2004-20231215-en
General
-
Target
29fbfd47de180d7288e0f6abd2d73985.exe
-
Size
413KB
-
MD5
29fbfd47de180d7288e0f6abd2d73985
-
SHA1
885bd8b876cbf79e22050a99eed7c974368cdd5b
-
SHA256
21da3ef858e63ba4296aafecb7b3c60512b3e57be4e076ca40265b1e7e339289
-
SHA512
ffca13e78b64059cc395609864e9d3bcaa6926580814878f7ae50ba9de007bd06e5c8e651a0eccb7eb675ceeaa0bc5dcb91cc8e84a690fbbea15b642073c4d28
-
SSDEEP
6144:pz0byeUKXHmPMEhMmdKkbHS8qmYVSFN+6jAgKORYBpgRBW7zQyn6aUpXBNfXgEET:gHyl9hqlVSFN+Vg/yBKRk6hnvaT
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1456-0-0x0000000000400000-0x000000000052B000-memory.dmp upx behavioral2/memory/1456-2-0x0000000000400000-0x000000000052B000-memory.dmp upx behavioral2/memory/1456-5-0x0000000000400000-0x000000000052B000-memory.dmp upx behavioral2/memory/1456-6-0x0000000000400000-0x000000000052B000-memory.dmp upx behavioral2/memory/1456-13-0x0000000000400000-0x000000000052B000-memory.dmp upx behavioral2/memory/1456-15-0x0000000000400000-0x000000000052B000-memory.dmp upx behavioral2/memory/1456-17-0x0000000000400000-0x000000000052B000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 29fbfd47de180d7288e0f6abd2d73985.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1456 29fbfd47de180d7288e0f6abd2d73985.exe 1456 29fbfd47de180d7288e0f6abd2d73985.exe 1456 29fbfd47de180d7288e0f6abd2d73985.exe 1456 29fbfd47de180d7288e0f6abd2d73985.exe 1456 29fbfd47de180d7288e0f6abd2d73985.exe 1456 29fbfd47de180d7288e0f6abd2d73985.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 1456 29fbfd47de180d7288e0f6abd2d73985.exe 1456 29fbfd47de180d7288e0f6abd2d73985.exe 1456 29fbfd47de180d7288e0f6abd2d73985.exe 1456 29fbfd47de180d7288e0f6abd2d73985.exe 1456 29fbfd47de180d7288e0f6abd2d73985.exe 1456 29fbfd47de180d7288e0f6abd2d73985.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1456 29fbfd47de180d7288e0f6abd2d73985.exe 1456 29fbfd47de180d7288e0f6abd2d73985.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\29fbfd47de180d7288e0f6abd2d73985.exe"C:\Users\Admin\AppData\Local\Temp\29fbfd47de180d7288e0f6abd2d73985.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1456