Analysis
-
max time kernel
116s -
max time network
115s -
platform
windows10_x64 -
resource
win10 -
submitted
12-07-2020 04:08
Static task
static1
Behavioral task
behavioral1
Sample
winosntkrnl.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
winosntkrnl.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
winosntkrnl.exe
-
Size
2.1MB
-
MD5
23959126c21fdda02365352cd3e03d28
-
SHA1
05a025b6ad3f4b88084624234312767e9402202a
-
SHA256
2a0ce8239387c614b1728bd9ec954e1e9ab985dde87e5976519ee1cfca1ee896
-
SHA512
ad5326da158a3701aeb827084a425ab7e2633ca59837241da449b03d4be7b8f77c336748dc1cf0f7d4fd4928f6258c83c7fbda9a5b28686f36e0666f07c42084
Score
6/10
Malware Config
Signatures
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3588 winosntkrnl.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 winosntkrnl.exe