Analysis
-
max time kernel
31s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
02/01/2024, 16:23
Static task
static1
Behavioral task
behavioral1
Sample
3e73f301ab770031d4e5ebe8c3abad19.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3e73f301ab770031d4e5ebe8c3abad19.exe
Resource
win10v2004-20231222-en
General
-
Target
3e73f301ab770031d4e5ebe8c3abad19.exe
-
Size
232KB
-
MD5
3e73f301ab770031d4e5ebe8c3abad19
-
SHA1
ae4497a2ccf5e0fb7b73fd5e94cbf09796879c35
-
SHA256
ddb07f7283d1b3d57a6bfb66a875b90b489d41587e4b5e5408b5c86e101a9bd1
-
SHA512
2a64ce2c32e526bb3a66349e502c16031fe4c2490fd3bd65d349ed9b09ceaed3741e645ed17cf9bf94805bbb06749ddfbeeb718f0755146fbc26f99d3b5631ac
-
SSDEEP
6144:zAPKoffu6gOQMLGdR9kvDoX9A3QVyEiYaLokTVPKcbi7MK/:zqfmqQMLGd8vDoXVy1jjTUcGQK
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\physicaldrive0 3e73f301ab770031d4e5ebe8c3abad19.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2088 3e73f301ab770031d4e5ebe8c3abad19.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2088 3e73f301ab770031d4e5ebe8c3abad19.exe