Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
10-03-2024 15:48
Behavioral task
behavioral1
Sample
befee4ada9f39d390c9c335eb2f8261b.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
befee4ada9f39d390c9c335eb2f8261b.exe
Resource
win10v2004-20231215-en
General
-
Target
befee4ada9f39d390c9c335eb2f8261b.exe
-
Size
465KB
-
MD5
befee4ada9f39d390c9c335eb2f8261b
-
SHA1
b5a45f445b53adfb8ad01c75cf59f42f918171a1
-
SHA256
025f821188c8938a548cc4b2e5cc838afef6a38a56a5352bf03c4f49cd674189
-
SHA512
b0ecfd6c29fc815d82685e24492817e2a95374fdbef885e5e0310f4df18fc3159a1fcd061e5d2e86bde51961f46608f8b90adef0b2bee62a6c89ac0f41b7510f
-
SSDEEP
6144:eqmNUNjFdYgMufB3YHTzY1A7i9NHNcUhW+gSbT9lm/9CMDI8bhoWYEET9:eqzNjbYgdBG+EiCqgMT9lm1BPhYvT
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/840-0-0x0000000000400000-0x0000000000475000-memory.dmp upx behavioral1/memory/840-1-0x0000000000400000-0x0000000000475000-memory.dmp upx behavioral1/memory/840-2-0x0000000000400000-0x0000000000475000-memory.dmp upx -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: befee4ada9f39d390c9c335eb2f8261b.exe File opened (read-only) \??\g: befee4ada9f39d390c9c335eb2f8261b.exe File opened (read-only) \??\x: befee4ada9f39d390c9c335eb2f8261b.exe File opened (read-only) \??\w: befee4ada9f39d390c9c335eb2f8261b.exe File opened (read-only) \??\j: befee4ada9f39d390c9c335eb2f8261b.exe File opened (read-only) \??\l: befee4ada9f39d390c9c335eb2f8261b.exe File opened (read-only) \??\n: befee4ada9f39d390c9c335eb2f8261b.exe File opened (read-only) \??\o: befee4ada9f39d390c9c335eb2f8261b.exe File opened (read-only) \??\r: befee4ada9f39d390c9c335eb2f8261b.exe File opened (read-only) \??\t: befee4ada9f39d390c9c335eb2f8261b.exe File opened (read-only) \??\u: befee4ada9f39d390c9c335eb2f8261b.exe File opened (read-only) \??\v: befee4ada9f39d390c9c335eb2f8261b.exe File opened (read-only) \??\i: befee4ada9f39d390c9c335eb2f8261b.exe File opened (read-only) \??\k: befee4ada9f39d390c9c335eb2f8261b.exe File opened (read-only) \??\m: befee4ada9f39d390c9c335eb2f8261b.exe File opened (read-only) \??\p: befee4ada9f39d390c9c335eb2f8261b.exe File opened (read-only) \??\y: befee4ada9f39d390c9c335eb2f8261b.exe File opened (read-only) \??\z: befee4ada9f39d390c9c335eb2f8261b.exe File opened (read-only) \??\h: befee4ada9f39d390c9c335eb2f8261b.exe File opened (read-only) \??\q: befee4ada9f39d390c9c335eb2f8261b.exe File opened (read-only) \??\s: befee4ada9f39d390c9c335eb2f8261b.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 befee4ada9f39d390c9c335eb2f8261b.exe