Analysis
-
max time kernel
30s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 20:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
756cb7e3c0d624aa9252eb7bf4c3a86e.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
756cb7e3c0d624aa9252eb7bf4c3a86e.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
756cb7e3c0d624aa9252eb7bf4c3a86e.exe
-
Size
147KB
-
MD5
756cb7e3c0d624aa9252eb7bf4c3a86e
-
SHA1
232d54e77173fca51691d2f319f71ecf4ed833d9
-
SHA256
5382fe742828eff226a316c62a435301d0b0ccf94b6cae9d6023b70bf9cbd101
-
SHA512
7fb703aa0d630a58581f629bbb845bcb7cbcf5f1cbc68bb1375ccf0c9f51f240fe3616795aa4cb3fd6e355ed03ce8cde6fe04a325b434a24f2afffeede5c6f39
-
SSDEEP
3072:g3nI3Iu4yGP03mAwEGYJTfwqDo41yStUSuI2os9stgOo:g3WIrXGG2TfwGUStgmtg
Score
6/10
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\physicaldrive0 756cb7e3c0d624aa9252eb7bf4c3a86e.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2016 756cb7e3c0d624aa9252eb7bf4c3a86e.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2016 756cb7e3c0d624aa9252eb7bf4c3a86e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2016 756cb7e3c0d624aa9252eb7bf4c3a86e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\756cb7e3c0d624aa9252eb7bf4c3a86e.exe"C:\Users\Admin\AppData\Local\Temp\756cb7e3c0d624aa9252eb7bf4c3a86e.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:2016