Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe
Resource
win10v2004-20240802-en
General
-
Target
14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe
-
Size
2.3MB
-
MD5
954cca734237d7d2510a5168245968ef
-
SHA1
7b8fe8c174c06a502545b813a099b522a26202ae
-
SHA256
14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0
-
SHA512
02a9325566a3a54ac042676b52a3e1584ecdbee06bee73767d2233423710f436fc65b42a08c542fa53b2f059e73cf37cef49520fd537c21fab018086a6212d26
-
SSDEEP
49152:EySrGORAQcP4sK2JXaz2iAdo/cNatLbhhZoSdJHcZ2Ixz4:5SrLlce2ZazSoENobhhnFTIi
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 884 14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe 884 14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 884 14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe Token: SeIncreaseQuotaPrivilege 11412 WMIC.exe Token: SeSecurityPrivilege 11412 WMIC.exe Token: SeTakeOwnershipPrivilege 11412 WMIC.exe Token: SeLoadDriverPrivilege 11412 WMIC.exe Token: SeSystemProfilePrivilege 11412 WMIC.exe Token: SeSystemtimePrivilege 11412 WMIC.exe Token: SeProfSingleProcessPrivilege 11412 WMIC.exe Token: SeIncBasePriorityPrivilege 11412 WMIC.exe Token: SeCreatePagefilePrivilege 11412 WMIC.exe Token: SeBackupPrivilege 11412 WMIC.exe Token: SeRestorePrivilege 11412 WMIC.exe Token: SeShutdownPrivilege 11412 WMIC.exe Token: SeDebugPrivilege 11412 WMIC.exe Token: SeSystemEnvironmentPrivilege 11412 WMIC.exe Token: SeRemoteShutdownPrivilege 11412 WMIC.exe Token: SeUndockPrivilege 11412 WMIC.exe Token: SeManageVolumePrivilege 11412 WMIC.exe Token: 33 11412 WMIC.exe Token: 34 11412 WMIC.exe Token: 35 11412 WMIC.exe Token: SeIncreaseQuotaPrivilege 11412 WMIC.exe Token: SeSecurityPrivilege 11412 WMIC.exe Token: SeTakeOwnershipPrivilege 11412 WMIC.exe Token: SeLoadDriverPrivilege 11412 WMIC.exe Token: SeSystemProfilePrivilege 11412 WMIC.exe Token: SeSystemtimePrivilege 11412 WMIC.exe Token: SeProfSingleProcessPrivilege 11412 WMIC.exe Token: SeIncBasePriorityPrivilege 11412 WMIC.exe Token: SeCreatePagefilePrivilege 11412 WMIC.exe Token: SeBackupPrivilege 11412 WMIC.exe Token: SeRestorePrivilege 11412 WMIC.exe Token: SeShutdownPrivilege 11412 WMIC.exe Token: SeDebugPrivilege 11412 WMIC.exe Token: SeSystemEnvironmentPrivilege 11412 WMIC.exe Token: SeRemoteShutdownPrivilege 11412 WMIC.exe Token: SeUndockPrivilege 11412 WMIC.exe Token: SeManageVolumePrivilege 11412 WMIC.exe Token: 33 11412 WMIC.exe Token: 34 11412 WMIC.exe Token: 35 11412 WMIC.exe Token: SeIncreaseQuotaPrivilege 11516 WMIC.exe Token: SeSecurityPrivilege 11516 WMIC.exe Token: SeTakeOwnershipPrivilege 11516 WMIC.exe Token: SeLoadDriverPrivilege 11516 WMIC.exe Token: SeSystemProfilePrivilege 11516 WMIC.exe Token: SeSystemtimePrivilege 11516 WMIC.exe Token: SeProfSingleProcessPrivilege 11516 WMIC.exe Token: SeIncBasePriorityPrivilege 11516 WMIC.exe Token: SeCreatePagefilePrivilege 11516 WMIC.exe Token: SeBackupPrivilege 11516 WMIC.exe Token: SeRestorePrivilege 11516 WMIC.exe Token: SeShutdownPrivilege 11516 WMIC.exe Token: SeDebugPrivilege 11516 WMIC.exe Token: SeSystemEnvironmentPrivilege 11516 WMIC.exe Token: SeRemoteShutdownPrivilege 11516 WMIC.exe Token: SeUndockPrivilege 11516 WMIC.exe Token: SeManageVolumePrivilege 11516 WMIC.exe Token: 33 11516 WMIC.exe Token: 34 11516 WMIC.exe Token: 35 11516 WMIC.exe Token: SeIncreaseQuotaPrivilege 11516 WMIC.exe Token: SeSecurityPrivilege 11516 WMIC.exe Token: SeTakeOwnershipPrivilege 11516 WMIC.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 884 14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe 884 14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe 884 14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe 884 14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe 884 14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 884 wrote to memory of 11388 884 14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe 30 PID 884 wrote to memory of 11388 884 14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe 30 PID 884 wrote to memory of 11388 884 14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe 30 PID 884 wrote to memory of 11388 884 14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe 30 PID 11388 wrote to memory of 11412 11388 cmd.exe 32 PID 11388 wrote to memory of 11412 11388 cmd.exe 32 PID 11388 wrote to memory of 11412 11388 cmd.exe 32 PID 11388 wrote to memory of 11412 11388 cmd.exe 32 PID 884 wrote to memory of 11492 884 14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe 34 PID 884 wrote to memory of 11492 884 14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe 34 PID 884 wrote to memory of 11492 884 14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe 34 PID 884 wrote to memory of 11492 884 14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe 34 PID 11492 wrote to memory of 11516 11492 cmd.exe 36 PID 11492 wrote to memory of 11516 11492 cmd.exe 36 PID 11492 wrote to memory of 11516 11492 cmd.exe 36 PID 11492 wrote to memory of 11516 11492 cmd.exe 36 PID 884 wrote to memory of 11548 884 14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe 37 PID 884 wrote to memory of 11548 884 14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe 37 PID 884 wrote to memory of 11548 884 14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe 37 PID 884 wrote to memory of 11548 884 14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe 37 PID 11548 wrote to memory of 11572 11548 cmd.exe 39 PID 11548 wrote to memory of 11572 11548 cmd.exe 39 PID 11548 wrote to memory of 11572 11548 cmd.exe 39 PID 11548 wrote to memory of 11572 11548 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe"C:\Users\Admin\AppData\Local\Temp\14bdbf5e023e29bfe7744db8217e1dde8180dd97d40dcd5caf10972e1bae43e0.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic cpu get name/value2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:11388 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name/value3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:11412
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic Path Win32_DisplayConfiguration get DeviceName/value2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:11492 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic Path Win32_DisplayConfiguration get DeviceName/value3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:11516
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic COMPUTERSYSTEM get TotalPhysicalMemory/value2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:11548 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic COMPUTERSYSTEM get TotalPhysicalMemory/value3⤵
- System Location Discovery: System Language Discovery
PID:11572
-
-