Analysis
-
max time kernel
141s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 05:10
Behavioral task
behavioral1
Sample
581024b17fba6ec3d93ef7e88e9acf5a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
581024b17fba6ec3d93ef7e88e9acf5a.exe
Resource
win10v2004-20231215-en
General
-
Target
581024b17fba6ec3d93ef7e88e9acf5a.exe
-
Size
200KB
-
MD5
581024b17fba6ec3d93ef7e88e9acf5a
-
SHA1
f9bf6965cd6f3fc7527636d551ff822397634d3b
-
SHA256
e9658c7edeb4469b76bb5535d64c061bafa2d278ee0360e2f3324b60f1fe12e6
-
SHA512
9230d11dec419197e2b3e4d0bb9e27d2f9974738ca540de3fc7d8ccd71247e1f19d81f4f40ed7a020fe9d076a6679bda99fed8ee99ebf6227fb2a2b8a8197e28
-
SSDEEP
6144:T7oBtDkJ3abnk6cV+EwmAoBNcX2NOkpwCi21gRQnfRK7/6:T78AqbaVcmAo7cGNpwCi+eQZKr6
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2160-0-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2160-17-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2160-18-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2160-21-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2160-22-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2160-23-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2160-26-0x0000000000400000-0x0000000000476000-memory.dmp upx behavioral1/memory/2160-29-0x0000000000400000-0x0000000000476000-memory.dmp upx -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\s: 581024b17fba6ec3d93ef7e88e9acf5a.exe File opened (read-only) \??\v: 581024b17fba6ec3d93ef7e88e9acf5a.exe File opened (read-only) \??\x: 581024b17fba6ec3d93ef7e88e9acf5a.exe File opened (read-only) \??\g: 581024b17fba6ec3d93ef7e88e9acf5a.exe File opened (read-only) \??\h: 581024b17fba6ec3d93ef7e88e9acf5a.exe File opened (read-only) \??\j: 581024b17fba6ec3d93ef7e88e9acf5a.exe File opened (read-only) \??\w: 581024b17fba6ec3d93ef7e88e9acf5a.exe File opened (read-only) \??\n: 581024b17fba6ec3d93ef7e88e9acf5a.exe File opened (read-only) \??\o: 581024b17fba6ec3d93ef7e88e9acf5a.exe File opened (read-only) \??\q: 581024b17fba6ec3d93ef7e88e9acf5a.exe File opened (read-only) \??\t: 581024b17fba6ec3d93ef7e88e9acf5a.exe File opened (read-only) \??\u: 581024b17fba6ec3d93ef7e88e9acf5a.exe File opened (read-only) \??\y: 581024b17fba6ec3d93ef7e88e9acf5a.exe File opened (read-only) \??\i: 581024b17fba6ec3d93ef7e88e9acf5a.exe File opened (read-only) \??\k: 581024b17fba6ec3d93ef7e88e9acf5a.exe File opened (read-only) \??\m: 581024b17fba6ec3d93ef7e88e9acf5a.exe File opened (read-only) \??\r: 581024b17fba6ec3d93ef7e88e9acf5a.exe File opened (read-only) \??\z: 581024b17fba6ec3d93ef7e88e9acf5a.exe File opened (read-only) \??\e: 581024b17fba6ec3d93ef7e88e9acf5a.exe File opened (read-only) \??\l: 581024b17fba6ec3d93ef7e88e9acf5a.exe File opened (read-only) \??\p: 581024b17fba6ec3d93ef7e88e9acf5a.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 581024b17fba6ec3d93ef7e88e9acf5a.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\SAItest.txt 581024b17fba6ec3d93ef7e88e9acf5a.exe