Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 21:20
Static task
static1
Behavioral task
behavioral1
Sample
dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe
Resource
win10v2004-20240508-en
General
-
Target
dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe
-
Size
10.0MB
-
MD5
1f58ab9592fd399a1636c98a842f8ffb
-
SHA1
4e47129ebd8fb2f07163a6548a5d93d1183e6ee4
-
SHA256
dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a
-
SHA512
71a12e650820e9bcb2548cf3450663af81931e039542f60ad1b9ea9c41a0c5f2e91ae3ccc0a8e7fc087887fe041f8579355a1f865cca68b03d544f05d653edd5
-
SSDEEP
196608:TB3dTQozppoKpov5+9c3ekByrCpU+sb9d++kdDk5OJPfmZ:T7QozTBp05SDkHUzfvYfmZ
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1932 dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe 1932 dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2772 systeminfo.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1932 dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe 1932 dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1932 dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe 1932 dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2804 1932 dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe 28 PID 1932 wrote to memory of 2804 1932 dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe 28 PID 1932 wrote to memory of 2804 1932 dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe 28 PID 1932 wrote to memory of 2804 1932 dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe 28 PID 2804 wrote to memory of 2772 2804 cmd.exe 30 PID 2804 wrote to memory of 2772 2804 cmd.exe 30 PID 2804 wrote to memory of 2772 2804 cmd.exe 30 PID 2804 wrote to memory of 2772 2804 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe"C:\Users\Admin\AppData\Local\Temp\dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\cmd.execmd.exe /c systeminfo2⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:2772
-
-