Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 06:19
Static task
static1
Behavioral task
behavioral1
Sample
4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe
Resource
win10v2004-20250314-en
General
-
Target
4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe
-
Size
627KB
-
MD5
0352bdde2c88720459d19ad829a6512b
-
SHA1
41a3f90d76b4a455d0fb22bc262aea774ce8ad06
-
SHA256
4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5
-
SHA512
087313e46ac16bfb4bb220ec5eb3468c89a630b7ea93e355dac2ebaf5a9c322625b515dc43bc13b02236a1dbfce10ec36ff621dbd723df282d4a51b3f4b61c75
-
SSDEEP
12288:55d3XhM6ThdQqWYgeWYg955/155/t+jBqUWOFapH/IFqSo5ME2:55dhZThdQIjBqhOFa9ggS62
Malware Config
Signatures
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\desktop.ini 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\system32lri.dat 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe File created C:\Windows\system32lrk.dat.id 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe File created C:\Windows\system32lrw.bmp 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe File created C:\Windows\system32lrk.dat 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe File created C:\Windows\system32lri.dat 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe File opened for modification C:\Windows\system32lrk.dat 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeCreateTokenPrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeAssignPrimaryTokenPrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeLockMemoryPrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeIncreaseQuotaPrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeMachineAccountPrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeTcbPrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeSecurityPrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeTakeOwnershipPrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeLoadDriverPrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeSystemProfilePrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeSystemtimePrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeProfSingleProcessPrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeIncBasePriorityPrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeCreatePagefilePrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeCreatePermanentPrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeBackupPrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeRestorePrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeShutdownPrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeDebugPrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeAuditPrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeSystemEnvironmentPrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeChangeNotifyPrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeRemoteShutdownPrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeUndockPrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeSyncAgentPrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeEnableDelegationPrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeManageVolumePrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeImpersonatePrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: SeCreateGlobalPrivilege 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: 31 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: 32 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: 33 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: 34 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: 35 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe Token: 36 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe"C:\Users\Admin\AppData\Local\Temp\4ffa3b051b4a3184307249485c29b1fd73965cbf6e7dfd020c76ba3e462011a5.exe"1⤵
- Drops desktop.ini file(s)
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8B
MD554770f963655c3a2129f7ec5efbbf7a5
SHA10cd141f148e6c8d246e105a309602aa149dc6bbb
SHA256caadbbb85c35ff120c092c5a5758e88f4775c6c8fa8bb669e351502d1f486018
SHA512f959e563fe6fa2ea1774713e890baa6bef719a66fac61879de35d773ee5ee1ff9c642d1e42bb5535028dceb8edc5624b38aba65ac9f808152941ed00c6d464c5
-
Filesize
32B
MD5e1bbe57cfd4d7c827c2fd28ff873a6fe
SHA10cf051be63b7f3efac9d7891d92e59404577819b
SHA25625aeb187b26255e7d4f0309cf0a31c20d7da15ee252470c1beb29419f0b7922a
SHA5124bec47396483bf5cd0c417ea69fef8ae69713f98915abba09d852435bf6e8cdd4a6623eadcfe13297c48b2428d1169bfc5001da0858a0d0b00fa69274f495947