Analysis
-
max time kernel
146s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 08:32
Behavioral task
behavioral1
Sample
b443aa0b52bd2cfc6bf13c007b9753ff.exe
Resource
win7-20240221-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
b443aa0b52bd2cfc6bf13c007b9753ff.exe
Resource
win10v2004-20240226-en
7 signatures
150 seconds
General
-
Target
b443aa0b52bd2cfc6bf13c007b9753ff.exe
-
Size
12.3MB
-
MD5
b443aa0b52bd2cfc6bf13c007b9753ff
-
SHA1
21d58a5038ae7d72183a7dd72395cd645b2fa4c5
-
SHA256
e06cd01976f49892d4d735ee1f82bc45f4cf24c60435e1053e6e073a3d6c98f0
-
SHA512
7f6a7e69f2c98c334ed3d1044ee42113f2636690a9032b1db6c950b9fbcb020343397ba38550fed3a37fdcf75f0ae1984e84c490f54ffb4e177adc02fba6d2c0
-
SSDEEP
393216:T1IfOrJRIeAq5FpoqapGWoeALVTqEkwBzzxr+IVfvKu:yM6mFkoDLUOzh3
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5060-0-0x0000000000400000-0x0000000001B4E000-memory.dmp vmprotect behavioral2/memory/5060-9-0x0000000000400000-0x0000000001B4E000-memory.dmp vmprotect behavioral2/memory/5060-14-0x0000000000400000-0x0000000001B4E000-memory.dmp vmprotect -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 b443aa0b52bd2cfc6bf13c007b9753ff.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5060 b443aa0b52bd2cfc6bf13c007b9753ff.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5060 b443aa0b52bd2cfc6bf13c007b9753ff.exe 5060 b443aa0b52bd2cfc6bf13c007b9753ff.exe 5060 b443aa0b52bd2cfc6bf13c007b9753ff.exe 5060 b443aa0b52bd2cfc6bf13c007b9753ff.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4812 wmic.exe Token: SeSecurityPrivilege 4812 wmic.exe Token: SeTakeOwnershipPrivilege 4812 wmic.exe Token: SeLoadDriverPrivilege 4812 wmic.exe Token: SeSystemProfilePrivilege 4812 wmic.exe Token: SeSystemtimePrivilege 4812 wmic.exe Token: SeProfSingleProcessPrivilege 4812 wmic.exe Token: SeIncBasePriorityPrivilege 4812 wmic.exe Token: SeCreatePagefilePrivilege 4812 wmic.exe Token: SeBackupPrivilege 4812 wmic.exe Token: SeRestorePrivilege 4812 wmic.exe Token: SeShutdownPrivilege 4812 wmic.exe Token: SeDebugPrivilege 4812 wmic.exe Token: SeSystemEnvironmentPrivilege 4812 wmic.exe Token: SeRemoteShutdownPrivilege 4812 wmic.exe Token: SeUndockPrivilege 4812 wmic.exe Token: SeManageVolumePrivilege 4812 wmic.exe Token: 33 4812 wmic.exe Token: 34 4812 wmic.exe Token: 35 4812 wmic.exe Token: 36 4812 wmic.exe Token: SeIncreaseQuotaPrivilege 4812 wmic.exe Token: SeSecurityPrivilege 4812 wmic.exe Token: SeTakeOwnershipPrivilege 4812 wmic.exe Token: SeLoadDriverPrivilege 4812 wmic.exe Token: SeSystemProfilePrivilege 4812 wmic.exe Token: SeSystemtimePrivilege 4812 wmic.exe Token: SeProfSingleProcessPrivilege 4812 wmic.exe Token: SeIncBasePriorityPrivilege 4812 wmic.exe Token: SeCreatePagefilePrivilege 4812 wmic.exe Token: SeBackupPrivilege 4812 wmic.exe Token: SeRestorePrivilege 4812 wmic.exe Token: SeShutdownPrivilege 4812 wmic.exe Token: SeDebugPrivilege 4812 wmic.exe Token: SeSystemEnvironmentPrivilege 4812 wmic.exe Token: SeRemoteShutdownPrivilege 4812 wmic.exe Token: SeUndockPrivilege 4812 wmic.exe Token: SeManageVolumePrivilege 4812 wmic.exe Token: 33 4812 wmic.exe Token: 34 4812 wmic.exe Token: 35 4812 wmic.exe Token: 36 4812 wmic.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5060 b443aa0b52bd2cfc6bf13c007b9753ff.exe 5060 b443aa0b52bd2cfc6bf13c007b9753ff.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5060 wrote to memory of 4812 5060 b443aa0b52bd2cfc6bf13c007b9753ff.exe 90 PID 5060 wrote to memory of 4812 5060 b443aa0b52bd2cfc6bf13c007b9753ff.exe 90 PID 5060 wrote to memory of 4812 5060 b443aa0b52bd2cfc6bf13c007b9753ff.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\b443aa0b52bd2cfc6bf13c007b9753ff.exe"C:\Users\Admin\AppData\Local\Temp\b443aa0b52bd2cfc6bf13c007b9753ff.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic BaseBoard get SerialNumber2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4812
-