Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 22:22
Static task
static1
Behavioral task
behavioral1
Sample
563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exe
Resource
win10v2004-20240508-en
General
-
Target
563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exe
-
Size
2.4MB
-
MD5
d40916bebe140e7cf46c97deff03edbf
-
SHA1
fcd389a0a54f26783985f9be93260b353001acda
-
SHA256
563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1
-
SHA512
9dec298d8fd8d5a3eba3af618f87a037445911ffbf7d62ee492f9c0a1e34897520fe7506b9a3881f66fb736ef1717c2efe9018054fd27112fd0a438be2c8ccca
-
SSDEEP
49152:JoNgRf9tTkvqHWzKVcBd6o6nt2rK09G4lyo0ZacSiLUswRI/CIJM:J+Qf7cqA0bt2rK09cohiLUbQJJM
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exedescription ioc process File opened for modification \??\PhysicalDrive0 563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exepid process 1612 563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exe 1612 563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exeWMIC.exeWMIC.exedescription pid process Token: SeDebugPrivilege 1612 563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exe Token: SeIncreaseQuotaPrivilege 7772 WMIC.exe Token: SeSecurityPrivilege 7772 WMIC.exe Token: SeTakeOwnershipPrivilege 7772 WMIC.exe Token: SeLoadDriverPrivilege 7772 WMIC.exe Token: SeSystemProfilePrivilege 7772 WMIC.exe Token: SeSystemtimePrivilege 7772 WMIC.exe Token: SeProfSingleProcessPrivilege 7772 WMIC.exe Token: SeIncBasePriorityPrivilege 7772 WMIC.exe Token: SeCreatePagefilePrivilege 7772 WMIC.exe Token: SeBackupPrivilege 7772 WMIC.exe Token: SeRestorePrivilege 7772 WMIC.exe Token: SeShutdownPrivilege 7772 WMIC.exe Token: SeDebugPrivilege 7772 WMIC.exe Token: SeSystemEnvironmentPrivilege 7772 WMIC.exe Token: SeRemoteShutdownPrivilege 7772 WMIC.exe Token: SeUndockPrivilege 7772 WMIC.exe Token: SeManageVolumePrivilege 7772 WMIC.exe Token: 33 7772 WMIC.exe Token: 34 7772 WMIC.exe Token: 35 7772 WMIC.exe Token: SeIncreaseQuotaPrivilege 7772 WMIC.exe Token: SeSecurityPrivilege 7772 WMIC.exe Token: SeTakeOwnershipPrivilege 7772 WMIC.exe Token: SeLoadDriverPrivilege 7772 WMIC.exe Token: SeSystemProfilePrivilege 7772 WMIC.exe Token: SeSystemtimePrivilege 7772 WMIC.exe Token: SeProfSingleProcessPrivilege 7772 WMIC.exe Token: SeIncBasePriorityPrivilege 7772 WMIC.exe Token: SeCreatePagefilePrivilege 7772 WMIC.exe Token: SeBackupPrivilege 7772 WMIC.exe Token: SeRestorePrivilege 7772 WMIC.exe Token: SeShutdownPrivilege 7772 WMIC.exe Token: SeDebugPrivilege 7772 WMIC.exe Token: SeSystemEnvironmentPrivilege 7772 WMIC.exe Token: SeRemoteShutdownPrivilege 7772 WMIC.exe Token: SeUndockPrivilege 7772 WMIC.exe Token: SeManageVolumePrivilege 7772 WMIC.exe Token: 33 7772 WMIC.exe Token: 34 7772 WMIC.exe Token: 35 7772 WMIC.exe Token: SeIncreaseQuotaPrivilege 7876 WMIC.exe Token: SeSecurityPrivilege 7876 WMIC.exe Token: SeTakeOwnershipPrivilege 7876 WMIC.exe Token: SeLoadDriverPrivilege 7876 WMIC.exe Token: SeSystemProfilePrivilege 7876 WMIC.exe Token: SeSystemtimePrivilege 7876 WMIC.exe Token: SeProfSingleProcessPrivilege 7876 WMIC.exe Token: SeIncBasePriorityPrivilege 7876 WMIC.exe Token: SeCreatePagefilePrivilege 7876 WMIC.exe Token: SeBackupPrivilege 7876 WMIC.exe Token: SeRestorePrivilege 7876 WMIC.exe Token: SeShutdownPrivilege 7876 WMIC.exe Token: SeDebugPrivilege 7876 WMIC.exe Token: SeSystemEnvironmentPrivilege 7876 WMIC.exe Token: SeRemoteShutdownPrivilege 7876 WMIC.exe Token: SeUndockPrivilege 7876 WMIC.exe Token: SeManageVolumePrivilege 7876 WMIC.exe Token: 33 7876 WMIC.exe Token: 34 7876 WMIC.exe Token: 35 7876 WMIC.exe Token: SeIncreaseQuotaPrivilege 7876 WMIC.exe Token: SeSecurityPrivilege 7876 WMIC.exe Token: SeTakeOwnershipPrivilege 7876 WMIC.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exepid process 1612 563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exe 1612 563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exe 1612 563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exe 1612 563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exe 1612 563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.execmd.execmd.execmd.exedescription pid process target process PID 1612 wrote to memory of 7748 1612 563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exe cmd.exe PID 1612 wrote to memory of 7748 1612 563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exe cmd.exe PID 1612 wrote to memory of 7748 1612 563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exe cmd.exe PID 1612 wrote to memory of 7748 1612 563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exe cmd.exe PID 7748 wrote to memory of 7772 7748 cmd.exe WMIC.exe PID 7748 wrote to memory of 7772 7748 cmd.exe WMIC.exe PID 7748 wrote to memory of 7772 7748 cmd.exe WMIC.exe PID 7748 wrote to memory of 7772 7748 cmd.exe WMIC.exe PID 1612 wrote to memory of 7852 1612 563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exe cmd.exe PID 1612 wrote to memory of 7852 1612 563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exe cmd.exe PID 1612 wrote to memory of 7852 1612 563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exe cmd.exe PID 1612 wrote to memory of 7852 1612 563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exe cmd.exe PID 7852 wrote to memory of 7876 7852 cmd.exe WMIC.exe PID 7852 wrote to memory of 7876 7852 cmd.exe WMIC.exe PID 7852 wrote to memory of 7876 7852 cmd.exe WMIC.exe PID 7852 wrote to memory of 7876 7852 cmd.exe WMIC.exe PID 1612 wrote to memory of 7908 1612 563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exe cmd.exe PID 1612 wrote to memory of 7908 1612 563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exe cmd.exe PID 1612 wrote to memory of 7908 1612 563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exe cmd.exe PID 1612 wrote to memory of 7908 1612 563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exe cmd.exe PID 7908 wrote to memory of 7932 7908 cmd.exe WMIC.exe PID 7908 wrote to memory of 7932 7908 cmd.exe WMIC.exe PID 7908 wrote to memory of 7932 7908 cmd.exe WMIC.exe PID 7908 wrote to memory of 7932 7908 cmd.exe WMIC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exe"C:\Users\Admin\AppData\Local\Temp\563276c2b6466b12707c4ebc8a630ff16f95a668ffcbbef4faf74888941754e1.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic cpu get name/value2⤵
- Suspicious use of WriteProcessMemory
PID:7748 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name/value3⤵
- Suspicious use of AdjustPrivilegeToken
PID:7772 -
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic Path Win32_DisplayConfiguration get DeviceName/value2⤵
- Suspicious use of WriteProcessMemory
PID:7852 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic Path Win32_DisplayConfiguration get DeviceName/value3⤵
- Suspicious use of AdjustPrivilegeToken
PID:7876 -
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic COMPUTERSYSTEM get TotalPhysicalMemory/value2⤵
- Suspicious use of WriteProcessMemory
PID:7908 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic COMPUTERSYSTEM get TotalPhysicalMemory/value3⤵PID:7932