Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 17:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a26361664f5d730258dd0a7af15fbd78.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
a26361664f5d730258dd0a7af15fbd78.exe
Resource
win10v2004-20240221-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
a26361664f5d730258dd0a7af15fbd78.exe
-
Size
1.0MB
-
MD5
a26361664f5d730258dd0a7af15fbd78
-
SHA1
855d84fede54be85524f750e385450b4cc3ae398
-
SHA256
5bd06a10bf00150d81282baa4128947434c86ed1c914264f28e771c9bc8288d9
-
SHA512
23b054ac30165400b9a8621182cf1bffa8849d3ba17c414d3e45cb60887fadd0095899566eeae0f6ba2e476ea3e6c1749fdf5111eca6ebfc49e4ed401ba53a68
-
SSDEEP
24576:Ztz9uXStrPcYwPEdel+7gxoKI01A1nxBmf:Lz9ZVadlkgL1E3mf
Score
6/10
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 a26361664f5d730258dd0a7af15fbd78.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1552 set thread context of 2740 1552 a26361664f5d730258dd0a7af15fbd78.exe 28 -
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" a26361664f5d730258dd0a7af15fbd78.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key a26361664f5d730258dd0a7af15fbd78.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ a26361664f5d730258dd0a7af15fbd78.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1552 a26361664f5d730258dd0a7af15fbd78.exe Token: SeDebugPrivilege 1552 a26361664f5d730258dd0a7af15fbd78.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1552 wrote to memory of 2740 1552 a26361664f5d730258dd0a7af15fbd78.exe 28 PID 1552 wrote to memory of 2740 1552 a26361664f5d730258dd0a7af15fbd78.exe 28 PID 1552 wrote to memory of 2740 1552 a26361664f5d730258dd0a7af15fbd78.exe 28 PID 1552 wrote to memory of 2740 1552 a26361664f5d730258dd0a7af15fbd78.exe 28 PID 1552 wrote to memory of 2740 1552 a26361664f5d730258dd0a7af15fbd78.exe 28 PID 1552 wrote to memory of 2740 1552 a26361664f5d730258dd0a7af15fbd78.exe 28 PID 1552 wrote to memory of 2740 1552 a26361664f5d730258dd0a7af15fbd78.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a26361664f5d730258dd0a7af15fbd78.exe"C:\Users\Admin\AppData\Local\Temp\a26361664f5d730258dd0a7af15fbd78.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\a26361664f5d730258dd0a7af15fbd78.exeC:\Users\Admin\AppData\Local\Temp\a26361664f5d730258dd0a7af15fbd78.exe2⤵PID:2740
-