Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 02:36
Static task
static1
Behavioral task
behavioral1
Sample
c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe
Resource
win10v2004-20240508-en
General
-
Target
c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe
-
Size
6.6MB
-
MD5
50988ba5ebd7e11da9cea1407022c7e2
-
SHA1
857302a3f0a2b9637320fdcb30bf1bcdd1005bbe
-
SHA256
c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162
-
SHA512
038035ff99322c06f690f7667c3724b292dff10e4e26833e1d4bc4b4d56504da2abc47c98e3524c0310182469e53b773b8ce245ff5f02d90e5e83d9bbb47ba1a
-
SSDEEP
196608:NGXQiaF7UPs7m9a9wePdq+55Czy6uMiYdDMS4SKwi6uO:NsQiaFHmk97Pw+55CzNtiYdDMrSKuuO
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe File opened (read-only) \??\i: c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe File opened (read-only) \??\j: c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe File opened (read-only) \??\l: c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe File opened (read-only) \??\m: c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe File opened (read-only) \??\r: c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe File opened (read-only) \??\a: c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe File opened (read-only) \??\b: c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe File opened (read-only) \??\y: c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe File opened (read-only) \??\z: c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe File opened (read-only) \??\w: c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe File opened (read-only) \??\x: c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe File opened (read-only) \??\o: c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe File opened (read-only) \??\p: c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe File opened (read-only) \??\v: c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe File opened (read-only) \??\g: c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe File opened (read-only) \??\k: c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe File opened (read-only) \??\t: c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe File opened (read-only) \??\h: c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe File opened (read-only) \??\n: c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe File opened (read-only) \??\u: c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe File opened (read-only) \??\q: c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe File opened (read-only) \??\s: c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2656 c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe 2656 c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2656 c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2656 c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2656 c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe 2656 c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe 2656 c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe 2656 c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe 2656 c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe 2656 c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe 2656 c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe"C:\Users\Admin\AppData\Local\Temp\c8b71fd65b9bd79f9ff256ac251364197c83fff145435fdf8924486d5341f162.exe"1⤵
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2656