Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-06-2024 00:30
Static task
static1
Behavioral task
behavioral1
Sample
006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c.exe
Resource
win10v2004-20240508-en
General
-
Target
006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c.exe
-
Size
2.4MB
-
MD5
dc78b858ee8619d20abab7c958ca7144
-
SHA1
5c091ec3ce31e24e68bd257f868a0c9ee9b06de9
-
SHA256
006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c
-
SHA512
c8eb2ec2f540d12941d38a7f7654716dd3949cc1a77754ff4b5d5f14a323c1a536059a065d377a16218863d7c157f614e4c1d39d34bbfd981a2348e662182544
-
SSDEEP
49152:JoNgRf9tTkvqHWzKVcBd6o6nt2rK09G4lyo0ZacSiLUswRI/CIJb:J+Qf7cqA0bt2rK09cohiLUbQJJb
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2292 006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c.exe 2292 006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2292 006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c.exe Token: SeIncreaseQuotaPrivilege 10612 WMIC.exe Token: SeSecurityPrivilege 10612 WMIC.exe Token: SeTakeOwnershipPrivilege 10612 WMIC.exe Token: SeLoadDriverPrivilege 10612 WMIC.exe Token: SeSystemProfilePrivilege 10612 WMIC.exe Token: SeSystemtimePrivilege 10612 WMIC.exe Token: SeProfSingleProcessPrivilege 10612 WMIC.exe Token: SeIncBasePriorityPrivilege 10612 WMIC.exe Token: SeCreatePagefilePrivilege 10612 WMIC.exe Token: SeBackupPrivilege 10612 WMIC.exe Token: SeRestorePrivilege 10612 WMIC.exe Token: SeShutdownPrivilege 10612 WMIC.exe Token: SeDebugPrivilege 10612 WMIC.exe Token: SeSystemEnvironmentPrivilege 10612 WMIC.exe Token: SeRemoteShutdownPrivilege 10612 WMIC.exe Token: SeUndockPrivilege 10612 WMIC.exe Token: SeManageVolumePrivilege 10612 WMIC.exe Token: 33 10612 WMIC.exe Token: 34 10612 WMIC.exe Token: 35 10612 WMIC.exe Token: SeIncreaseQuotaPrivilege 10612 WMIC.exe Token: SeSecurityPrivilege 10612 WMIC.exe Token: SeTakeOwnershipPrivilege 10612 WMIC.exe Token: SeLoadDriverPrivilege 10612 WMIC.exe Token: SeSystemProfilePrivilege 10612 WMIC.exe Token: SeSystemtimePrivilege 10612 WMIC.exe Token: SeProfSingleProcessPrivilege 10612 WMIC.exe Token: SeIncBasePriorityPrivilege 10612 WMIC.exe Token: SeCreatePagefilePrivilege 10612 WMIC.exe Token: SeBackupPrivilege 10612 WMIC.exe Token: SeRestorePrivilege 10612 WMIC.exe Token: SeShutdownPrivilege 10612 WMIC.exe Token: SeDebugPrivilege 10612 WMIC.exe Token: SeSystemEnvironmentPrivilege 10612 WMIC.exe Token: SeRemoteShutdownPrivilege 10612 WMIC.exe Token: SeUndockPrivilege 10612 WMIC.exe Token: SeManageVolumePrivilege 10612 WMIC.exe Token: 33 10612 WMIC.exe Token: 34 10612 WMIC.exe Token: 35 10612 WMIC.exe Token: SeIncreaseQuotaPrivilege 10752 WMIC.exe Token: SeSecurityPrivilege 10752 WMIC.exe Token: SeTakeOwnershipPrivilege 10752 WMIC.exe Token: SeLoadDriverPrivilege 10752 WMIC.exe Token: SeSystemProfilePrivilege 10752 WMIC.exe Token: SeSystemtimePrivilege 10752 WMIC.exe Token: SeProfSingleProcessPrivilege 10752 WMIC.exe Token: SeIncBasePriorityPrivilege 10752 WMIC.exe Token: SeCreatePagefilePrivilege 10752 WMIC.exe Token: SeBackupPrivilege 10752 WMIC.exe Token: SeRestorePrivilege 10752 WMIC.exe Token: SeShutdownPrivilege 10752 WMIC.exe Token: SeDebugPrivilege 10752 WMIC.exe Token: SeSystemEnvironmentPrivilege 10752 WMIC.exe Token: SeRemoteShutdownPrivilege 10752 WMIC.exe Token: SeUndockPrivilege 10752 WMIC.exe Token: SeManageVolumePrivilege 10752 WMIC.exe Token: 33 10752 WMIC.exe Token: 34 10752 WMIC.exe Token: 35 10752 WMIC.exe Token: SeIncreaseQuotaPrivilege 10752 WMIC.exe Token: SeSecurityPrivilege 10752 WMIC.exe Token: SeTakeOwnershipPrivilege 10752 WMIC.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2292 006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c.exe 2292 006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c.exe 2292 006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c.exe 2292 006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c.exe 2292 006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2292 wrote to memory of 10580 2292 006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c.exe 28 PID 2292 wrote to memory of 10580 2292 006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c.exe 28 PID 2292 wrote to memory of 10580 2292 006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c.exe 28 PID 2292 wrote to memory of 10580 2292 006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c.exe 28 PID 10580 wrote to memory of 10612 10580 cmd.exe 30 PID 10580 wrote to memory of 10612 10580 cmd.exe 30 PID 10580 wrote to memory of 10612 10580 cmd.exe 30 PID 10580 wrote to memory of 10612 10580 cmd.exe 30 PID 2292 wrote to memory of 10728 2292 006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c.exe 32 PID 2292 wrote to memory of 10728 2292 006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c.exe 32 PID 2292 wrote to memory of 10728 2292 006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c.exe 32 PID 2292 wrote to memory of 10728 2292 006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c.exe 32 PID 10728 wrote to memory of 10752 10728 cmd.exe 34 PID 10728 wrote to memory of 10752 10728 cmd.exe 34 PID 10728 wrote to memory of 10752 10728 cmd.exe 34 PID 10728 wrote to memory of 10752 10728 cmd.exe 34 PID 2292 wrote to memory of 10784 2292 006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c.exe 35 PID 2292 wrote to memory of 10784 2292 006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c.exe 35 PID 2292 wrote to memory of 10784 2292 006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c.exe 35 PID 2292 wrote to memory of 10784 2292 006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c.exe 35 PID 10784 wrote to memory of 10808 10784 cmd.exe 37 PID 10784 wrote to memory of 10808 10784 cmd.exe 37 PID 10784 wrote to memory of 10808 10784 cmd.exe 37 PID 10784 wrote to memory of 10808 10784 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c.exe"C:\Users\Admin\AppData\Local\Temp\006d858bd4cc987dce20565d811ea5ad9b00f49ae33ed0f73f29f8bbd9203c9c.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic cpu get name/value2⤵
- Suspicious use of WriteProcessMemory
PID:10580 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name/value3⤵
- Suspicious use of AdjustPrivilegeToken
PID:10612
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic Path Win32_DisplayConfiguration get DeviceName/value2⤵
- Suspicious use of WriteProcessMemory
PID:10728 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic Path Win32_DisplayConfiguration get DeviceName/value3⤵
- Suspicious use of AdjustPrivilegeToken
PID:10752
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic COMPUTERSYSTEM get TotalPhysicalMemory/value2⤵
- Suspicious use of WriteProcessMemory
PID:10784 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic COMPUTERSYSTEM get TotalPhysicalMemory/value3⤵PID:10808
-
-