Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31/10/2024, 16:12
Static task
static1
Behavioral task
behavioral1
Sample
27a4503a947b0bc0d2d411a9ed0b0b8ab2528954a4b4e0d34093a38bb7403db7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
27a4503a947b0bc0d2d411a9ed0b0b8ab2528954a4b4e0d34093a38bb7403db7.exe
Resource
win10v2004-20241007-en
General
-
Target
27a4503a947b0bc0d2d411a9ed0b0b8ab2528954a4b4e0d34093a38bb7403db7.exe
-
Size
247KB
-
MD5
b98d5d369c5f92993fa214f97eb6492b
-
SHA1
9e694e49526fea88d08d0d96d1c5cb6abf0b3620
-
SHA256
27a4503a947b0bc0d2d411a9ed0b0b8ab2528954a4b4e0d34093a38bb7403db7
-
SHA512
7afc5749810ca98045aa9e344339515b5cc2c761090fb670a4f6182ec3800c7642adb2ead49beeda49df38b64493f1fc11d409f9c331d67535a93d33ba09ad06
-
SSDEEP
3072:12RaiKg4xmUh1WXHqw/l+qmOELhakVsm3mxB32tLEv8zfdn5f2dZLCozOhhBn+Tj:10KgGwHqwOOELha+sm2D2+UhnguyRR
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 27a4503a947b0bc0d2d411a9ed0b0b8ab2528954a4b4e0d34093a38bb7403db7.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27a4503a947b0bc0d2d411a9ed0b0b8ab2528954a4b4e0d34093a38bb7403db7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\27a4503a947b0bc0d2d411a9ed0b0b8ab2528954a4b4e0d34093a38bb7403db7.exe"C:\Users\Admin\AppData\Local\Temp\27a4503a947b0bc0d2d411a9ed0b0b8ab2528954a4b4e0d34093a38bb7403db7.exe"1⤵
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:2668