Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
21-10-2021 22:04
Static task
static1
Behavioral task
behavioral1
Sample
5f49add551b892182f4f851fe3b80106b1594bcb29285e008ce71e4cb2d2cf31.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
5f49add551b892182f4f851fe3b80106b1594bcb29285e008ce71e4cb2d2cf31.exe
-
Size
583KB
-
MD5
1c9c80f30bef32ed5b1a50b3e5afbe3b
-
SHA1
3b99016f14e84dc4fa515db780ee60e88769b9e7
-
SHA256
5f49add551b892182f4f851fe3b80106b1594bcb29285e008ce71e4cb2d2cf31
-
SHA512
1a4149a96dd0f8ce9ded7560e2f8a46892d3050f1e7893deb9f99865dfd5faf3ae75a9bd9b8832978ce149c387dcb517c0935f9616838e8944acac850bbb690c
Score
6/10
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
5f49add551b892182f4f851fe3b80106b1594bcb29285e008ce71e4cb2d2cf31.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 5f49add551b892182f4f851fe3b80106b1594bcb29285e008ce71e4cb2d2cf31.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1880-115-0x0000000004CE0000-0x0000000004D40000-memory.dmpFilesize
384KB
-
memory/1880-116-0x0000000004D40000-0x0000000004DAB000-memory.dmpFilesize
428KB
-
memory/1880-117-0x0000000000400000-0x0000000002F58000-memory.dmpFilesize
43.3MB
-
memory/1880-118-0x0000000000400000-0x0000000002F58000-memory.dmpFilesize
43.3MB