Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-03-2024 14:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
cb9b49187ec7ba6ec0e71a8da8b9b440.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
cb9b49187ec7ba6ec0e71a8da8b9b440.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
cb9b49187ec7ba6ec0e71a8da8b9b440.exe
-
Size
939KB
-
MD5
cb9b49187ec7ba6ec0e71a8da8b9b440
-
SHA1
1c5b76fb8c8843753bfed2cc7f82c10e625a9448
-
SHA256
742b742011dd93dbaedbe8df31b031d6d66c4f42ce46536c030c619798ebc912
-
SHA512
22cfa8308f778535efb47f128750944507774ab41641c23023f5cbcfe4c3e164ad190051f4594747df3a549db18e51577341375fbc067709694a899987023190
-
SSDEEP
24576:NJeTCplnW5ui5Pd2M0UTLpnw8edwTte1dMmAu:veTYnu55w8edlMmJ
Score
6/10
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 cb9b49187ec7ba6ec0e71a8da8b9b440.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main cb9b49187ec7ba6ec0e71a8da8b9b440.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe 1396 cb9b49187ec7ba6ec0e71a8da8b9b440.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb9b49187ec7ba6ec0e71a8da8b9b440.exe"C:\Users\Admin\AppData\Local\Temp\cb9b49187ec7ba6ec0e71a8da8b9b440.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1396