Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 07:00
Static task
static1
Behavioral task
behavioral1
Sample
77b172c86652d811e40b17003c34987fd8bdfe8d415712aefbdab4a43b637622.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
77b172c86652d811e40b17003c34987fd8bdfe8d415712aefbdab4a43b637622.exe
Resource
win10v2004-20240508-en
General
-
Target
77b172c86652d811e40b17003c34987fd8bdfe8d415712aefbdab4a43b637622.exe
-
Size
9.9MB
-
MD5
add73c9376cadb3c29370162f18ea8cb
-
SHA1
a35a42bb55eea73b8800d39c77e0e33bb85cbe00
-
SHA256
77b172c86652d811e40b17003c34987fd8bdfe8d415712aefbdab4a43b637622
-
SHA512
41ab9ff20c3e426ba414067bc32f89cabc11fc1329ea74b8a5736d51f942792e1c82b58ee9dfb38fc3acf56f9c5ff156a8fb7af2e7c46b231365a94ba388758a
-
SSDEEP
196608:/BzJo+aWJuiDGoLHsBw2HORWbH/eBMDH23k/l/Es28f:/BlTa+uqdLHkw0SWSB4qk/l/Es2
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 77b172c86652d811e40b17003c34987fd8bdfe8d415712aefbdab4a43b637622.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2332 77b172c86652d811e40b17003c34987fd8bdfe8d415712aefbdab4a43b637622.exe 2332 77b172c86652d811e40b17003c34987fd8bdfe8d415712aefbdab4a43b637622.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2640 systeminfo.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2332 77b172c86652d811e40b17003c34987fd8bdfe8d415712aefbdab4a43b637622.exe 2332 77b172c86652d811e40b17003c34987fd8bdfe8d415712aefbdab4a43b637622.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2332 77b172c86652d811e40b17003c34987fd8bdfe8d415712aefbdab4a43b637622.exe 2332 77b172c86652d811e40b17003c34987fd8bdfe8d415712aefbdab4a43b637622.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2648 2332 77b172c86652d811e40b17003c34987fd8bdfe8d415712aefbdab4a43b637622.exe 28 PID 2332 wrote to memory of 2648 2332 77b172c86652d811e40b17003c34987fd8bdfe8d415712aefbdab4a43b637622.exe 28 PID 2332 wrote to memory of 2648 2332 77b172c86652d811e40b17003c34987fd8bdfe8d415712aefbdab4a43b637622.exe 28 PID 2332 wrote to memory of 2648 2332 77b172c86652d811e40b17003c34987fd8bdfe8d415712aefbdab4a43b637622.exe 28 PID 2648 wrote to memory of 2640 2648 cmd.exe 30 PID 2648 wrote to memory of 2640 2648 cmd.exe 30 PID 2648 wrote to memory of 2640 2648 cmd.exe 30 PID 2648 wrote to memory of 2640 2648 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\77b172c86652d811e40b17003c34987fd8bdfe8d415712aefbdab4a43b637622.exe"C:\Users\Admin\AppData\Local\Temp\77b172c86652d811e40b17003c34987fd8bdfe8d415712aefbdab4a43b637622.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\cmd.execmd.exe /c systeminfo2⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:2640
-
-