Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 04:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3be001b680218c4c3322f63b918f0d53.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
3be001b680218c4c3322f63b918f0d53.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
3be001b680218c4c3322f63b918f0d53.exe
-
Size
395KB
-
MD5
3be001b680218c4c3322f63b918f0d53
-
SHA1
bdc4cd6e22d864abd02c1fa7109c1bc83ccfa5f6
-
SHA256
7d07ca94eaf1bc96c1d7a5d0d7f17cecc2225bb33c7058afd21d7a354d451d74
-
SHA512
02670fe370958e99a5cbca504528ecb58136c8192e938784c8851a01d02e98c6092dd70ab21d44d3aac584bfcd5f82f30b53abb697204793f31d26f70373a8cb
-
SSDEEP
12288:YT+CBfh2vArpTnt2aNdtfQunka1KNaTnH:Y/hEArZt2afFBkkzH
Score
6/10
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 3be001b680218c4c3322f63b918f0d53.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main 3be001b680218c4c3322f63b918f0d53.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2288 3be001b680218c4c3322f63b918f0d53.exe 2288 3be001b680218c4c3322f63b918f0d53.exe