Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 23:28
Static task
static1
Behavioral task
behavioral1
Sample
aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe
Resource
win10v2004-20240802-en
General
-
Target
aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe
-
Size
2.3MB
-
MD5
347493fb63f169a7cb91002cde2e34bf
-
SHA1
0a546ef058bc9b234a9d8f512cec87ea18280c12
-
SHA256
aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98
-
SHA512
dc859a225bec0e1b5aa610ade158a3863b3f497dbaae546dc7e54352786c80a5921b5e797bbbdfc0b8d5e091999cef688033c5fda7051d340ad5bed07af660a3
-
SSDEEP
49152:EySrGORAQcP4sK2JXaz2iAdo/cNatLbhhZoSdJHcZ2IxzU:5SrLlce2ZazSoENobhhnFTIm
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2824 aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe 2824 aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2824 aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe Token: SeIncreaseQuotaPrivilege 8232 WMIC.exe Token: SeSecurityPrivilege 8232 WMIC.exe Token: SeTakeOwnershipPrivilege 8232 WMIC.exe Token: SeLoadDriverPrivilege 8232 WMIC.exe Token: SeSystemProfilePrivilege 8232 WMIC.exe Token: SeSystemtimePrivilege 8232 WMIC.exe Token: SeProfSingleProcessPrivilege 8232 WMIC.exe Token: SeIncBasePriorityPrivilege 8232 WMIC.exe Token: SeCreatePagefilePrivilege 8232 WMIC.exe Token: SeBackupPrivilege 8232 WMIC.exe Token: SeRestorePrivilege 8232 WMIC.exe Token: SeShutdownPrivilege 8232 WMIC.exe Token: SeDebugPrivilege 8232 WMIC.exe Token: SeSystemEnvironmentPrivilege 8232 WMIC.exe Token: SeRemoteShutdownPrivilege 8232 WMIC.exe Token: SeUndockPrivilege 8232 WMIC.exe Token: SeManageVolumePrivilege 8232 WMIC.exe Token: 33 8232 WMIC.exe Token: 34 8232 WMIC.exe Token: 35 8232 WMIC.exe Token: SeIncreaseQuotaPrivilege 8232 WMIC.exe Token: SeSecurityPrivilege 8232 WMIC.exe Token: SeTakeOwnershipPrivilege 8232 WMIC.exe Token: SeLoadDriverPrivilege 8232 WMIC.exe Token: SeSystemProfilePrivilege 8232 WMIC.exe Token: SeSystemtimePrivilege 8232 WMIC.exe Token: SeProfSingleProcessPrivilege 8232 WMIC.exe Token: SeIncBasePriorityPrivilege 8232 WMIC.exe Token: SeCreatePagefilePrivilege 8232 WMIC.exe Token: SeBackupPrivilege 8232 WMIC.exe Token: SeRestorePrivilege 8232 WMIC.exe Token: SeShutdownPrivilege 8232 WMIC.exe Token: SeDebugPrivilege 8232 WMIC.exe Token: SeSystemEnvironmentPrivilege 8232 WMIC.exe Token: SeRemoteShutdownPrivilege 8232 WMIC.exe Token: SeUndockPrivilege 8232 WMIC.exe Token: SeManageVolumePrivilege 8232 WMIC.exe Token: 33 8232 WMIC.exe Token: 34 8232 WMIC.exe Token: 35 8232 WMIC.exe Token: SeIncreaseQuotaPrivilege 8336 WMIC.exe Token: SeSecurityPrivilege 8336 WMIC.exe Token: SeTakeOwnershipPrivilege 8336 WMIC.exe Token: SeLoadDriverPrivilege 8336 WMIC.exe Token: SeSystemProfilePrivilege 8336 WMIC.exe Token: SeSystemtimePrivilege 8336 WMIC.exe Token: SeProfSingleProcessPrivilege 8336 WMIC.exe Token: SeIncBasePriorityPrivilege 8336 WMIC.exe Token: SeCreatePagefilePrivilege 8336 WMIC.exe Token: SeBackupPrivilege 8336 WMIC.exe Token: SeRestorePrivilege 8336 WMIC.exe Token: SeShutdownPrivilege 8336 WMIC.exe Token: SeDebugPrivilege 8336 WMIC.exe Token: SeSystemEnvironmentPrivilege 8336 WMIC.exe Token: SeRemoteShutdownPrivilege 8336 WMIC.exe Token: SeUndockPrivilege 8336 WMIC.exe Token: SeManageVolumePrivilege 8336 WMIC.exe Token: 33 8336 WMIC.exe Token: 34 8336 WMIC.exe Token: 35 8336 WMIC.exe Token: SeIncreaseQuotaPrivilege 8336 WMIC.exe Token: SeSecurityPrivilege 8336 WMIC.exe Token: SeTakeOwnershipPrivilege 8336 WMIC.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2824 aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe 2824 aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe 2824 aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe 2824 aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe 2824 aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2824 wrote to memory of 8208 2824 aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe 30 PID 2824 wrote to memory of 8208 2824 aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe 30 PID 2824 wrote to memory of 8208 2824 aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe 30 PID 2824 wrote to memory of 8208 2824 aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe 30 PID 8208 wrote to memory of 8232 8208 cmd.exe 32 PID 8208 wrote to memory of 8232 8208 cmd.exe 32 PID 8208 wrote to memory of 8232 8208 cmd.exe 32 PID 8208 wrote to memory of 8232 8208 cmd.exe 32 PID 2824 wrote to memory of 8312 2824 aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe 34 PID 2824 wrote to memory of 8312 2824 aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe 34 PID 2824 wrote to memory of 8312 2824 aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe 34 PID 2824 wrote to memory of 8312 2824 aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe 34 PID 8312 wrote to memory of 8336 8312 cmd.exe 36 PID 8312 wrote to memory of 8336 8312 cmd.exe 36 PID 8312 wrote to memory of 8336 8312 cmd.exe 36 PID 8312 wrote to memory of 8336 8312 cmd.exe 36 PID 2824 wrote to memory of 8376 2824 aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe 37 PID 2824 wrote to memory of 8376 2824 aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe 37 PID 2824 wrote to memory of 8376 2824 aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe 37 PID 2824 wrote to memory of 8376 2824 aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe 37 PID 8376 wrote to memory of 8400 8376 cmd.exe 39 PID 8376 wrote to memory of 8400 8376 cmd.exe 39 PID 8376 wrote to memory of 8400 8376 cmd.exe 39 PID 8376 wrote to memory of 8400 8376 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe"C:\Users\Admin\AppData\Local\Temp\aba2aeaab544d7536f9b35fc39dd4f0e546a385a0e94a37bf9b0bb98019caa98.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic cpu get name/value2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:8208 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name/value3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:8232
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic Path Win32_DisplayConfiguration get DeviceName/value2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:8312 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic Path Win32_DisplayConfiguration get DeviceName/value3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:8336
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic COMPUTERSYSTEM get TotalPhysicalMemory/value2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:8376 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic COMPUTERSYSTEM get TotalPhysicalMemory/value3⤵
- System Location Discovery: System Language Discovery
PID:8400
-
-