Analysis
-
max time kernel
93s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2024 07:38
Behavioral task
behavioral1
Sample
98d8ad3d04e00e250c447ed67f08c4a3.exe
Resource
win7-20231129-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
98d8ad3d04e00e250c447ed67f08c4a3.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
98d8ad3d04e00e250c447ed67f08c4a3.exe
-
Size
12.3MB
-
MD5
98d8ad3d04e00e250c447ed67f08c4a3
-
SHA1
4d5c89af51f63d3689ce56d9a666ba15732229a3
-
SHA256
0513d4c04b29a4a2671a12f7c1213f7536d4ca979c99287bc9e156f5416583cc
-
SHA512
b94e0722b5b46c4674f1ab9ec028bc18e46eea969a2578fdf9bc47b1a80f6fe4727b65b2e6692329dc3b9f24450800b7cbe16d4db149b78f8e36367c513ec7ec
-
SSDEEP
393216:4fLHvRcgV3jrz7O+auf/diuiG6d8VmLjzAkxbIs440oG:GLHvRP3j/y+Ff/UG6SVgxbIT40z
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2944-2-0x0000000000400000-0x0000000001B55000-memory.dmp vmprotect behavioral2/memory/2944-9-0x0000000000400000-0x0000000001B55000-memory.dmp vmprotect behavioral2/memory/2944-15-0x0000000000400000-0x0000000001B55000-memory.dmp vmprotect -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 98d8ad3d04e00e250c447ed67f08c4a3.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2944 98d8ad3d04e00e250c447ed67f08c4a3.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2944 98d8ad3d04e00e250c447ed67f08c4a3.exe 2944 98d8ad3d04e00e250c447ed67f08c4a3.exe 2944 98d8ad3d04e00e250c447ed67f08c4a3.exe 2944 98d8ad3d04e00e250c447ed67f08c4a3.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4332 wmic.exe Token: SeSecurityPrivilege 4332 wmic.exe Token: SeTakeOwnershipPrivilege 4332 wmic.exe Token: SeLoadDriverPrivilege 4332 wmic.exe Token: SeSystemProfilePrivilege 4332 wmic.exe Token: SeSystemtimePrivilege 4332 wmic.exe Token: SeProfSingleProcessPrivilege 4332 wmic.exe Token: SeIncBasePriorityPrivilege 4332 wmic.exe Token: SeCreatePagefilePrivilege 4332 wmic.exe Token: SeBackupPrivilege 4332 wmic.exe Token: SeRestorePrivilege 4332 wmic.exe Token: SeShutdownPrivilege 4332 wmic.exe Token: SeDebugPrivilege 4332 wmic.exe Token: SeSystemEnvironmentPrivilege 4332 wmic.exe Token: SeRemoteShutdownPrivilege 4332 wmic.exe Token: SeUndockPrivilege 4332 wmic.exe Token: SeManageVolumePrivilege 4332 wmic.exe Token: 33 4332 wmic.exe Token: 34 4332 wmic.exe Token: 35 4332 wmic.exe Token: 36 4332 wmic.exe Token: SeIncreaseQuotaPrivilege 4332 wmic.exe Token: SeSecurityPrivilege 4332 wmic.exe Token: SeTakeOwnershipPrivilege 4332 wmic.exe Token: SeLoadDriverPrivilege 4332 wmic.exe Token: SeSystemProfilePrivilege 4332 wmic.exe Token: SeSystemtimePrivilege 4332 wmic.exe Token: SeProfSingleProcessPrivilege 4332 wmic.exe Token: SeIncBasePriorityPrivilege 4332 wmic.exe Token: SeCreatePagefilePrivilege 4332 wmic.exe Token: SeBackupPrivilege 4332 wmic.exe Token: SeRestorePrivilege 4332 wmic.exe Token: SeShutdownPrivilege 4332 wmic.exe Token: SeDebugPrivilege 4332 wmic.exe Token: SeSystemEnvironmentPrivilege 4332 wmic.exe Token: SeRemoteShutdownPrivilege 4332 wmic.exe Token: SeUndockPrivilege 4332 wmic.exe Token: SeManageVolumePrivilege 4332 wmic.exe Token: 33 4332 wmic.exe Token: 34 4332 wmic.exe Token: 35 4332 wmic.exe Token: 36 4332 wmic.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2944 98d8ad3d04e00e250c447ed67f08c4a3.exe 2944 98d8ad3d04e00e250c447ed67f08c4a3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2944 wrote to memory of 4332 2944 98d8ad3d04e00e250c447ed67f08c4a3.exe 84 PID 2944 wrote to memory of 4332 2944 98d8ad3d04e00e250c447ed67f08c4a3.exe 84 PID 2944 wrote to memory of 4332 2944 98d8ad3d04e00e250c447ed67f08c4a3.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\98d8ad3d04e00e250c447ed67f08c4a3.exe"C:\Users\Admin\AppData\Local\Temp\98d8ad3d04e00e250c447ed67f08c4a3.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic BaseBoard get SerialNumber2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4332
-