Analysis
-
max time kernel
135s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 21:20
Static task
static1
Behavioral task
behavioral1
Sample
dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe
Resource
win10v2004-20240508-en
General
-
Target
dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe
-
Size
10.0MB
-
MD5
1f58ab9592fd399a1636c98a842f8ffb
-
SHA1
4e47129ebd8fb2f07163a6548a5d93d1183e6ee4
-
SHA256
dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a
-
SHA512
71a12e650820e9bcb2548cf3450663af81931e039542f60ad1b9ea9c41a0c5f2e91ae3ccc0a8e7fc087887fe041f8579355a1f865cca68b03d544f05d653edd5
-
SSDEEP
196608:TB3dTQozppoKpov5+9c3ekByrCpU+sb9d++kdDk5OJPfmZ:T7QozTBp05SDkHUzfvYfmZ
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4932 dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe 4932 dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2964 systeminfo.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4932 dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe 4932 dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe 4932 dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe 4932 dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4932 dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe 4932 dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4932 wrote to memory of 3292 4932 dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe 84 PID 4932 wrote to memory of 3292 4932 dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe 84 PID 4932 wrote to memory of 3292 4932 dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe 84 PID 3292 wrote to memory of 2964 3292 cmd.exe 87 PID 3292 wrote to memory of 2964 3292 cmd.exe 87 PID 3292 wrote to memory of 2964 3292 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe"C:\Users\Admin\AppData\Local\Temp\dd6c752530d44fec544b8c3212ad9f7675bfb0b572bd619419337a31ff283c6a.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\cmd.execmd.exe /c systeminfo2⤵
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:2964
-
-