Analysis
-
max time kernel
10s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 16:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
lowp.exe
Resource
win7-20240705-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
lowp.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
lowp.exe
-
Size
16KB
-
MD5
e62880664e1afaea27c8e68e8ebb20ea
-
SHA1
b26c5f0aeafb3af4ea66faa2bafa4b880954fb2a
-
SHA256
b0f3baaebd35505c4bb6c6acb8c2f640136288798aef53d8234f60051e3567a3
-
SHA512
dbdc764f834e6740475ea141fc015e2f14f02407001b20dd5ef319c1005d80ed200b050e55a96d5d47bb1f6c9fe075de8623156f98a4e2664364cb04a6c0caab
-
SSDEEP
384:V6mIc5/Izu3dIHpIpOjlQmEzwmaTtdME81D3:V6mIcXOHpezWTcHZ
Score
6/10
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 lowp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2624 lowp.exe