Analysis
-
max time kernel
30s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 05:04
Static task
static1
Behavioral task
behavioral1
Sample
988bfb9a4513d061f3ac02e5e56f2c3a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
988bfb9a4513d061f3ac02e5e56f2c3a.exe
Resource
win10v2004-20231215-en
General
-
Target
988bfb9a4513d061f3ac02e5e56f2c3a.exe
-
Size
142KB
-
MD5
988bfb9a4513d061f3ac02e5e56f2c3a
-
SHA1
d700e1fcf8fceceefaa763020b26a52b1f4f6aad
-
SHA256
4611ffc571688d6d45cb1c9b5e8f8f41b353ac6138e802cf127ddf7e296f3d33
-
SHA512
0ba18c7746965db2717a88ec004859f17ffcecd2160307c685ee33e74f41f3eb713aabf5d3bb98e48e8975fd4dbb00071eb5375f54f198598195fec379b9f862
-
SSDEEP
3072:D0B5rnPHs5/Dn17yhvJAtWyePIoZSHfwGyMA4bxjGReItBD:Wn+DxyhCtDaIoZS/wGyMA09G
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\physicaldrive0 988bfb9a4513d061f3ac02e5e56f2c3a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2496 988bfb9a4513d061f3ac02e5e56f2c3a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2496 988bfb9a4513d061f3ac02e5e56f2c3a.exe