Analysis
-
max time kernel
138s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2024 01:34
Static task
static1
Behavioral task
behavioral1
Sample
c85bda7d8da013345bbda8c124024d3f8f5ca4dfd48e3584d3c0eabe8761f359.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c85bda7d8da013345bbda8c124024d3f8f5ca4dfd48e3584d3c0eabe8761f359.exe
Resource
win10v2004-20231215-en
General
-
Target
c85bda7d8da013345bbda8c124024d3f8f5ca4dfd48e3584d3c0eabe8761f359.exe
-
Size
4.8MB
-
MD5
2b5b1fb2bcdc43eceb1535aee280a5bf
-
SHA1
64b484fe777af9497ddc9c3917be9bd50d0aa9d9
-
SHA256
c85bda7d8da013345bbda8c124024d3f8f5ca4dfd48e3584d3c0eabe8761f359
-
SHA512
cf799185bce5dd1efba821c8484165d65000f2ac361d3c3daef99ae0ce632eecf99cac9854470d58175ddf24e348fd99689df418d37ccf3c9c81ed195e3236ca
-
SSDEEP
98304:WeLpmrmc2lAu28lkcf5YjovKqGYiOE8oLj5dIClU3OOQO+YA:FcmZl85gyjovK65E8oEClU3oO1A
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 3300 c85bda7d8da013345bbda8c124024d3f8f5ca4dfd48e3584d3c0eabe8761f359.exe 3300 c85bda7d8da013345bbda8c124024d3f8f5ca4dfd48e3584d3c0eabe8761f359.exe 3300 c85bda7d8da013345bbda8c124024d3f8f5ca4dfd48e3584d3c0eabe8761f359.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 c85bda7d8da013345bbda8c124024d3f8f5ca4dfd48e3584d3c0eabe8761f359.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
234KB
MD5cd03029957ebc78c0ca7a6c02a9ca846
SHA10044114b8073781479044f0294701be9611be2ac
SHA256139fdd92e6ddf1aac0761a68502b374daa32e82039621018511dc491ed9b4048
SHA51214c641cb9536def0ddc1969d50b97b83a23017c97373e3ad74d3fbf9825ac81f3fdf8169281c8ad4cebd45d9c9ae05f752d553ba4653e620889b274479cb7c32
-
Filesize
2.1MB
MD5c35ab236702291f1a2d090af8ea253d9
SHA1d7f58f0f5fee6b26564af3c5d7ab6defe5a4608d
SHA256c4dba892a9a1fb675d06dd615c4fc079e9f4e12a8368e8bd18e37137ed567f35
SHA51287a3fa1927ad2fad117055411a471be95275a4d4bf99ee3ab522faee70067b239bb77ddd94c4300958607efd4a3fc071df2262754557fca2530e70f2c438a068
-
Filesize
2B
MD5444bcb3a3fcf8389296c49467f27e1d6
SHA17a85f4764bbd6daf1c3545efbbf0f279a6dc0beb
SHA2562689367b205c16ce32ed4200942b8b8b1e262dfc70d9bc9fbc77c49699a4f1df
SHA5129fbbbb5a0f329f9782e2356fa41d89cf9b3694327c1a934d6af2a9df2d7f936ce83717fb513196a4ce5548471708cd7134c2ae99b3c357bcabb2eafc7b9b7570
-
Filesize
1.1MB
MD5a46135bdd574092d85955070e72d5aad
SHA1aad137b0a883fea22b7118778512ffc7865513bc
SHA256aa57160684feb240a85da677caaf7cf6a08b7349d89ae9cb4a3476884d80aac5
SHA51272188f348d9ae33e2b5a7886c80667cc3015bfac170249537baa9e31abf8d63ca198903206feb64887f1d509a1b9bfc9f54ede8b3aa26bee3f5c4375e5c6a24b