Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2024 09:43
Static task
static1
Behavioral task
behavioral1
Sample
4dfbad475b27a8a0efb1e9a7ef7970b2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4dfbad475b27a8a0efb1e9a7ef7970b2.exe
Resource
win10v2004-20231222-en
General
-
Target
4dfbad475b27a8a0efb1e9a7ef7970b2.exe
-
Size
21KB
-
MD5
4dfbad475b27a8a0efb1e9a7ef7970b2
-
SHA1
547450bb3a828bc8ac65dc31d96636ef77c2b610
-
SHA256
8f94644c3292463229a39c1cff372b557f6571493b4c84fed8bce221cc1125b0
-
SHA512
6f98e8353cf7ca146816a9d8a2e3913f967df453a90323de81b9d1152bb59c0194ae21fe79059d8296bb5f16bbe18f027ae376b2574a9ce1edb3c108d05905a2
-
SSDEEP
384:oCljiQc8rLfOf5x9nsBObC2ZQhCSgnPLUyLJ+6aOy9xRHjU:fiQcjX9nsBObxZQhCSgQyLA64l
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
IEXPLORE.EXEdescription ioc Process File opened for modification \??\PhysicalDrive0 IEXPLORE.EXE -
Suspicious use of SetThreadContext 1 IoCs
Processes:
4dfbad475b27a8a0efb1e9a7ef7970b2.exedescription pid Process procid_target PID 4436 set thread context of 944 4436 4dfbad475b27a8a0efb1e9a7ef7970b2.exe 15 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
IEXPLORE.EXEpid Process 944 IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
4dfbad475b27a8a0efb1e9a7ef7970b2.exedescription pid Process Token: SeIncBasePriorityPrivilege 4436 4dfbad475b27a8a0efb1e9a7ef7970b2.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
4dfbad475b27a8a0efb1e9a7ef7970b2.exedescription pid Process procid_target PID 4436 wrote to memory of 944 4436 4dfbad475b27a8a0efb1e9a7ef7970b2.exe 15 PID 4436 wrote to memory of 944 4436 4dfbad475b27a8a0efb1e9a7ef7970b2.exe 15 PID 4436 wrote to memory of 944 4436 4dfbad475b27a8a0efb1e9a7ef7970b2.exe 15 PID 4436 wrote to memory of 944 4436 4dfbad475b27a8a0efb1e9a7ef7970b2.exe 15 PID 4436 wrote to memory of 944 4436 4dfbad475b27a8a0efb1e9a7ef7970b2.exe 15 PID 4436 wrote to memory of 944 4436 4dfbad475b27a8a0efb1e9a7ef7970b2.exe 15 PID 4436 wrote to memory of 944 4436 4dfbad475b27a8a0efb1e9a7ef7970b2.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dfbad475b27a8a0efb1e9a7ef7970b2.exe"C:\Users\Admin\AppData\Local\Temp\4dfbad475b27a8a0efb1e9a7ef7970b2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
PID:944
-