Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 20:15
Static task
static1
Behavioral task
behavioral1
Sample
ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c.exe
Resource
win10v2004-20240508-en
General
-
Target
ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c.exe
-
Size
2.4MB
-
MD5
edfcf7f77a69130c9c0893b4864f050d
-
SHA1
d207d0175fee3a6dfc4623111930a5aee27a7001
-
SHA256
ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c
-
SHA512
bf469b8269d0788965542cc3d8e0795f590fbc8b19d12f9508a406c5c5b4f4983e596ee094ccd0d28c540a0a8697b552081734302f2a1b64a0c491148aa7e55e
-
SSDEEP
49152:JoNgRf9tTkvqHWzKVcBd6o6nt2rK09G4lyo0ZacSiLUswRI/CIJg:J+Qf7cqA0bt2rK09cohiLUbQJJg
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1704 ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c.exe 1704 ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1704 ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c.exe Token: SeIncreaseQuotaPrivilege 6876 WMIC.exe Token: SeSecurityPrivilege 6876 WMIC.exe Token: SeTakeOwnershipPrivilege 6876 WMIC.exe Token: SeLoadDriverPrivilege 6876 WMIC.exe Token: SeSystemProfilePrivilege 6876 WMIC.exe Token: SeSystemtimePrivilege 6876 WMIC.exe Token: SeProfSingleProcessPrivilege 6876 WMIC.exe Token: SeIncBasePriorityPrivilege 6876 WMIC.exe Token: SeCreatePagefilePrivilege 6876 WMIC.exe Token: SeBackupPrivilege 6876 WMIC.exe Token: SeRestorePrivilege 6876 WMIC.exe Token: SeShutdownPrivilege 6876 WMIC.exe Token: SeDebugPrivilege 6876 WMIC.exe Token: SeSystemEnvironmentPrivilege 6876 WMIC.exe Token: SeRemoteShutdownPrivilege 6876 WMIC.exe Token: SeUndockPrivilege 6876 WMIC.exe Token: SeManageVolumePrivilege 6876 WMIC.exe Token: 33 6876 WMIC.exe Token: 34 6876 WMIC.exe Token: 35 6876 WMIC.exe Token: SeIncreaseQuotaPrivilege 6876 WMIC.exe Token: SeSecurityPrivilege 6876 WMIC.exe Token: SeTakeOwnershipPrivilege 6876 WMIC.exe Token: SeLoadDriverPrivilege 6876 WMIC.exe Token: SeSystemProfilePrivilege 6876 WMIC.exe Token: SeSystemtimePrivilege 6876 WMIC.exe Token: SeProfSingleProcessPrivilege 6876 WMIC.exe Token: SeIncBasePriorityPrivilege 6876 WMIC.exe Token: SeCreatePagefilePrivilege 6876 WMIC.exe Token: SeBackupPrivilege 6876 WMIC.exe Token: SeRestorePrivilege 6876 WMIC.exe Token: SeShutdownPrivilege 6876 WMIC.exe Token: SeDebugPrivilege 6876 WMIC.exe Token: SeSystemEnvironmentPrivilege 6876 WMIC.exe Token: SeRemoteShutdownPrivilege 6876 WMIC.exe Token: SeUndockPrivilege 6876 WMIC.exe Token: SeManageVolumePrivilege 6876 WMIC.exe Token: 33 6876 WMIC.exe Token: 34 6876 WMIC.exe Token: 35 6876 WMIC.exe Token: SeIncreaseQuotaPrivilege 6996 WMIC.exe Token: SeSecurityPrivilege 6996 WMIC.exe Token: SeTakeOwnershipPrivilege 6996 WMIC.exe Token: SeLoadDriverPrivilege 6996 WMIC.exe Token: SeSystemProfilePrivilege 6996 WMIC.exe Token: SeSystemtimePrivilege 6996 WMIC.exe Token: SeProfSingleProcessPrivilege 6996 WMIC.exe Token: SeIncBasePriorityPrivilege 6996 WMIC.exe Token: SeCreatePagefilePrivilege 6996 WMIC.exe Token: SeBackupPrivilege 6996 WMIC.exe Token: SeRestorePrivilege 6996 WMIC.exe Token: SeShutdownPrivilege 6996 WMIC.exe Token: SeDebugPrivilege 6996 WMIC.exe Token: SeSystemEnvironmentPrivilege 6996 WMIC.exe Token: SeRemoteShutdownPrivilege 6996 WMIC.exe Token: SeUndockPrivilege 6996 WMIC.exe Token: SeManageVolumePrivilege 6996 WMIC.exe Token: 33 6996 WMIC.exe Token: 34 6996 WMIC.exe Token: 35 6996 WMIC.exe Token: SeIncreaseQuotaPrivilege 6996 WMIC.exe Token: SeSecurityPrivilege 6996 WMIC.exe Token: SeTakeOwnershipPrivilege 6996 WMIC.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1704 ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c.exe 1704 ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c.exe 1704 ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c.exe 1704 ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c.exe 1704 ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1704 wrote to memory of 5808 1704 ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c.exe 28 PID 1704 wrote to memory of 5808 1704 ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c.exe 28 PID 1704 wrote to memory of 5808 1704 ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c.exe 28 PID 1704 wrote to memory of 5808 1704 ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c.exe 28 PID 5808 wrote to memory of 6876 5808 cmd.exe 30 PID 5808 wrote to memory of 6876 5808 cmd.exe 30 PID 5808 wrote to memory of 6876 5808 cmd.exe 30 PID 5808 wrote to memory of 6876 5808 cmd.exe 30 PID 1704 wrote to memory of 6968 1704 ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c.exe 32 PID 1704 wrote to memory of 6968 1704 ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c.exe 32 PID 1704 wrote to memory of 6968 1704 ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c.exe 32 PID 1704 wrote to memory of 6968 1704 ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c.exe 32 PID 6968 wrote to memory of 6996 6968 cmd.exe 34 PID 6968 wrote to memory of 6996 6968 cmd.exe 34 PID 6968 wrote to memory of 6996 6968 cmd.exe 34 PID 6968 wrote to memory of 6996 6968 cmd.exe 34 PID 1704 wrote to memory of 6880 1704 ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c.exe 35 PID 1704 wrote to memory of 6880 1704 ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c.exe 35 PID 1704 wrote to memory of 6880 1704 ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c.exe 35 PID 1704 wrote to memory of 6880 1704 ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c.exe 35 PID 6880 wrote to memory of 7032 6880 cmd.exe 37 PID 6880 wrote to memory of 7032 6880 cmd.exe 37 PID 6880 wrote to memory of 7032 6880 cmd.exe 37 PID 6880 wrote to memory of 7032 6880 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c.exe"C:\Users\Admin\AppData\Local\Temp\ac407d54e108bd1e64ba2551f5157b98a42f2a02744b8d333d23570c12e4953c.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic cpu get name/value2⤵
- Suspicious use of WriteProcessMemory
PID:5808 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name/value3⤵
- Suspicious use of AdjustPrivilegeToken
PID:6876
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic Path Win32_DisplayConfiguration get DeviceName/value2⤵
- Suspicious use of WriteProcessMemory
PID:6968 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic Path Win32_DisplayConfiguration get DeviceName/value3⤵
- Suspicious use of AdjustPrivilegeToken
PID:6996
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic COMPUTERSYSTEM get TotalPhysicalMemory/value2⤵
- Suspicious use of WriteProcessMemory
PID:6880 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic COMPUTERSYSTEM get TotalPhysicalMemory/value3⤵PID:7032
-
-