Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 14:52
Static task
static1
Behavioral task
behavioral1
Sample
9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe
Resource
win10v2004-20240802-en
General
-
Target
9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe
-
Size
2.4MB
-
MD5
4da19bf7071ce56ab19b1415b6eb0847
-
SHA1
431d194ed73769e68d0b8660d7dbaac32caef34c
-
SHA256
9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746
-
SHA512
59b26572c0891b04246a44ec54b81caf4350e9e5643842e7b75f433af13239fdfaf417056161a6fab4204d48c94408448ff588d484dcfb63bf9ffdb3dcbac5ed
-
SSDEEP
49152:JoNgRf9tTkvqHWzKVcBd6o6nt2rK09G4lyo0ZacSiLUswRI/CIJA:J+Qf7cqA0bt2rK09cohiLUbQJJA
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1628 9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe 1628 9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1628 9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe Token: SeIncreaseQuotaPrivilege 3320 WMIC.exe Token: SeSecurityPrivilege 3320 WMIC.exe Token: SeTakeOwnershipPrivilege 3320 WMIC.exe Token: SeLoadDriverPrivilege 3320 WMIC.exe Token: SeSystemProfilePrivilege 3320 WMIC.exe Token: SeSystemtimePrivilege 3320 WMIC.exe Token: SeProfSingleProcessPrivilege 3320 WMIC.exe Token: SeIncBasePriorityPrivilege 3320 WMIC.exe Token: SeCreatePagefilePrivilege 3320 WMIC.exe Token: SeBackupPrivilege 3320 WMIC.exe Token: SeRestorePrivilege 3320 WMIC.exe Token: SeShutdownPrivilege 3320 WMIC.exe Token: SeDebugPrivilege 3320 WMIC.exe Token: SeSystemEnvironmentPrivilege 3320 WMIC.exe Token: SeRemoteShutdownPrivilege 3320 WMIC.exe Token: SeUndockPrivilege 3320 WMIC.exe Token: SeManageVolumePrivilege 3320 WMIC.exe Token: 33 3320 WMIC.exe Token: 34 3320 WMIC.exe Token: 35 3320 WMIC.exe Token: SeIncreaseQuotaPrivilege 3320 WMIC.exe Token: SeSecurityPrivilege 3320 WMIC.exe Token: SeTakeOwnershipPrivilege 3320 WMIC.exe Token: SeLoadDriverPrivilege 3320 WMIC.exe Token: SeSystemProfilePrivilege 3320 WMIC.exe Token: SeSystemtimePrivilege 3320 WMIC.exe Token: SeProfSingleProcessPrivilege 3320 WMIC.exe Token: SeIncBasePriorityPrivilege 3320 WMIC.exe Token: SeCreatePagefilePrivilege 3320 WMIC.exe Token: SeBackupPrivilege 3320 WMIC.exe Token: SeRestorePrivilege 3320 WMIC.exe Token: SeShutdownPrivilege 3320 WMIC.exe Token: SeDebugPrivilege 3320 WMIC.exe Token: SeSystemEnvironmentPrivilege 3320 WMIC.exe Token: SeRemoteShutdownPrivilege 3320 WMIC.exe Token: SeUndockPrivilege 3320 WMIC.exe Token: SeManageVolumePrivilege 3320 WMIC.exe Token: 33 3320 WMIC.exe Token: 34 3320 WMIC.exe Token: 35 3320 WMIC.exe Token: SeIncreaseQuotaPrivilege 5840 WMIC.exe Token: SeSecurityPrivilege 5840 WMIC.exe Token: SeTakeOwnershipPrivilege 5840 WMIC.exe Token: SeLoadDriverPrivilege 5840 WMIC.exe Token: SeSystemProfilePrivilege 5840 WMIC.exe Token: SeSystemtimePrivilege 5840 WMIC.exe Token: SeProfSingleProcessPrivilege 5840 WMIC.exe Token: SeIncBasePriorityPrivilege 5840 WMIC.exe Token: SeCreatePagefilePrivilege 5840 WMIC.exe Token: SeBackupPrivilege 5840 WMIC.exe Token: SeRestorePrivilege 5840 WMIC.exe Token: SeShutdownPrivilege 5840 WMIC.exe Token: SeDebugPrivilege 5840 WMIC.exe Token: SeSystemEnvironmentPrivilege 5840 WMIC.exe Token: SeRemoteShutdownPrivilege 5840 WMIC.exe Token: SeUndockPrivilege 5840 WMIC.exe Token: SeManageVolumePrivilege 5840 WMIC.exe Token: 33 5840 WMIC.exe Token: 34 5840 WMIC.exe Token: 35 5840 WMIC.exe Token: SeIncreaseQuotaPrivilege 5840 WMIC.exe Token: SeSecurityPrivilege 5840 WMIC.exe Token: SeTakeOwnershipPrivilege 5840 WMIC.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1628 9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe 1628 9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe 1628 9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe 1628 9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe 1628 9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1628 wrote to memory of 4612 1628 9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe 31 PID 1628 wrote to memory of 4612 1628 9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe 31 PID 1628 wrote to memory of 4612 1628 9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe 31 PID 1628 wrote to memory of 4612 1628 9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe 31 PID 4612 wrote to memory of 3320 4612 cmd.exe 33 PID 4612 wrote to memory of 3320 4612 cmd.exe 33 PID 4612 wrote to memory of 3320 4612 cmd.exe 33 PID 4612 wrote to memory of 3320 4612 cmd.exe 33 PID 1628 wrote to memory of 5440 1628 9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe 35 PID 1628 wrote to memory of 5440 1628 9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe 35 PID 1628 wrote to memory of 5440 1628 9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe 35 PID 1628 wrote to memory of 5440 1628 9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe 35 PID 5440 wrote to memory of 5840 5440 cmd.exe 37 PID 5440 wrote to memory of 5840 5440 cmd.exe 37 PID 5440 wrote to memory of 5840 5440 cmd.exe 37 PID 5440 wrote to memory of 5840 5440 cmd.exe 37 PID 1628 wrote to memory of 5808 1628 9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe 38 PID 1628 wrote to memory of 5808 1628 9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe 38 PID 1628 wrote to memory of 5808 1628 9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe 38 PID 1628 wrote to memory of 5808 1628 9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe 38 PID 5808 wrote to memory of 2732 5808 cmd.exe 40 PID 5808 wrote to memory of 2732 5808 cmd.exe 40 PID 5808 wrote to memory of 2732 5808 cmd.exe 40 PID 5808 wrote to memory of 2732 5808 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe"C:\Users\Admin\AppData\Local\Temp\9a4447e6bd46d9519863e6f282063c029b22e914d8aeb28ea5e06b20ade75746.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic cpu get name/value2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name/value3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3320
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic Path Win32_DisplayConfiguration get DeviceName/value2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5440 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic Path Win32_DisplayConfiguration get DeviceName/value3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5840
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic COMPUTERSYSTEM get TotalPhysicalMemory/value2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5808 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic COMPUTERSYSTEM get TotalPhysicalMemory/value3⤵
- System Location Discovery: System Language Discovery
PID:2732
-
-