Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14-02-2024 08:12
Behavioral task
behavioral1
Sample
9b2c96b26c75bb7c636104f64f15c80c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9b2c96b26c75bb7c636104f64f15c80c.exe
Resource
win10v2004-20231215-en
General
-
Target
9b2c96b26c75bb7c636104f64f15c80c.exe
-
Size
239KB
-
MD5
9b2c96b26c75bb7c636104f64f15c80c
-
SHA1
83ba7748887f4b93d3cb1299f7a6a8e35bc59a28
-
SHA256
3b8ce87807169e8f8f495df594cd6850eb097bb846f6c2de2e25ea03e2374e88
-
SHA512
177495d2fbdbda1d5d209991409f0e29896aaf14b686092f5853ed1b1f3d1ea17decc9ec9560876354d18d420117e481d9443fecc6c50d94cc919faedbb07e8a
-
SSDEEP
3072:qBwf1Nlq6Wa2DN54gmFtuyefdYG6w7cZvA6naTT3pBTed/y8McIpTRbFvN6HF8gJ:qGNNFWxD7mrHkWC4aTT5BBSIhRbX6l8e
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 9b2c96b26c75bb7c636104f64f15c80c.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2004 set thread context of 2784 2004 9b2c96b26c75bb7c636104f64f15c80c.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 9b2c96b26c75bb7c636104f64f15c80c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 9b2c96b26c75bb7c636104f64f15c80c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ 9b2c96b26c75bb7c636104f64f15c80c.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2784 9b2c96b26c75bb7c636104f64f15c80c.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2004 9b2c96b26c75bb7c636104f64f15c80c.exe 2004 9b2c96b26c75bb7c636104f64f15c80c.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2784 2004 9b2c96b26c75bb7c636104f64f15c80c.exe 28 PID 2004 wrote to memory of 2784 2004 9b2c96b26c75bb7c636104f64f15c80c.exe 28 PID 2004 wrote to memory of 2784 2004 9b2c96b26c75bb7c636104f64f15c80c.exe 28 PID 2004 wrote to memory of 2784 2004 9b2c96b26c75bb7c636104f64f15c80c.exe 28 PID 2004 wrote to memory of 2784 2004 9b2c96b26c75bb7c636104f64f15c80c.exe 28 PID 2004 wrote to memory of 2784 2004 9b2c96b26c75bb7c636104f64f15c80c.exe 28 PID 2004 wrote to memory of 2784 2004 9b2c96b26c75bb7c636104f64f15c80c.exe 28 PID 2004 wrote to memory of 2784 2004 9b2c96b26c75bb7c636104f64f15c80c.exe 28 PID 2004 wrote to memory of 2784 2004 9b2c96b26c75bb7c636104f64f15c80c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b2c96b26c75bb7c636104f64f15c80c.exe"C:\Users\Admin\AppData\Local\Temp\9b2c96b26c75bb7c636104f64f15c80c.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\9b2c96b26c75bb7c636104f64f15c80c.exeC:\Users\Admin\AppData\Local\Temp\9b2c96b26c75bb7c636104f64f15c80c.exe2⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:2784
-