Analysis

  • max time kernel
    152s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-01-2024 22:56

General

  • Target

    1bd00252035eadae62c03a8396b5b6e3c355082359714d8f02abd9770cb2ef7e.exe

  • Size

    1.0MB

  • MD5

    fb396e6e8b08308f8d12f2776eda4c85

  • SHA1

    69d56902ca69fb3486221301b76c67dcbd2d6bf6

  • SHA256

    1bd00252035eadae62c03a8396b5b6e3c355082359714d8f02abd9770cb2ef7e

  • SHA512

    a0048c628cdd7b3c1ea607e56c0eb4555f53a82d77a1d3cd0c585ca75c45def76bab64012adad8ddb7bcb7465a87dd0ee365fc2e948ca1517e76b07f4be6a32c

  • SSDEEP

    24576:sW9Ytb3SRxqO8m657w6ZBLmkitKqBCjC0PDgM5A6:sWWtbCJVV1BCjB

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1bd00252035eadae62c03a8396b5b6e3c355082359714d8f02abd9770cb2ef7e.exe
    "C:\Users\Admin\AppData\Local\Temp\1bd00252035eadae62c03a8396b5b6e3c355082359714d8f02abd9770cb2ef7e.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of AdjustPrivilegeToken
    PID:4220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4220-0-0x0000000075000000-0x00000000757B0000-memory.dmp

    Filesize

    7.7MB

  • memory/4220-1-0x0000000000040000-0x000000000014C000-memory.dmp

    Filesize

    1.0MB

  • memory/4220-2-0x0000000004B60000-0x0000000004B70000-memory.dmp

    Filesize

    64KB

  • memory/4220-3-0x0000000004F00000-0x0000000004FB0000-memory.dmp

    Filesize

    704KB

  • memory/4220-4-0x0000000004BF0000-0x0000000004BFA000-memory.dmp

    Filesize

    40KB

  • memory/4220-5-0x0000000005720000-0x0000000005C4C000-memory.dmp

    Filesize

    5.2MB

  • memory/4220-7-0x0000000007740000-0x00000000077A6000-memory.dmp

    Filesize

    408KB

  • memory/4220-8-0x0000000002500000-0x0000000004500000-memory.dmp

    Filesize

    32.0MB

  • memory/4220-9-0x0000000004B60000-0x0000000004B70000-memory.dmp

    Filesize

    64KB

  • memory/4220-10-0x0000000009FF0000-0x000000000A028000-memory.dmp

    Filesize

    224KB

  • memory/4220-11-0x0000000009FC0000-0x0000000009FCE000-memory.dmp

    Filesize

    56KB

  • memory/4220-14-0x0000000075000000-0x00000000757B0000-memory.dmp

    Filesize

    7.7MB

  • memory/4220-15-0x0000000005010000-0x0000000005032000-memory.dmp

    Filesize

    136KB

  • memory/4220-16-0x000000000B4D0000-0x000000000B824000-memory.dmp

    Filesize

    3.3MB

  • memory/4220-17-0x0000000004B60000-0x0000000004B70000-memory.dmp

    Filesize

    64KB

  • memory/4220-18-0x0000000002500000-0x0000000004500000-memory.dmp

    Filesize

    32.0MB

  • memory/4220-19-0x0000000004B60000-0x0000000004B70000-memory.dmp

    Filesize

    64KB