Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
21-10-2021 12:38
Static task
static1
Behavioral task
behavioral1
Sample
9d668ed556efc3f8ab5fccf5dcd19b289f5031a278adef4674b1c220b5f8b006.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
9d668ed556efc3f8ab5fccf5dcd19b289f5031a278adef4674b1c220b5f8b006.exe
-
Size
583KB
-
MD5
99501dbd9fffa84c4333b2f6cbc6c3f9
-
SHA1
c18b51bde8e219cf61ebe05f86a36a2566a43f66
-
SHA256
9d668ed556efc3f8ab5fccf5dcd19b289f5031a278adef4674b1c220b5f8b006
-
SHA512
86891d7452dfac0be28513e339a50a9634f548ef6f3b3483283b990a9b60ac8e5fac963f0b9611fb82b233aa512458f31a38caf74b0890e62047ce7027a57920
Score
6/10
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
9d668ed556efc3f8ab5fccf5dcd19b289f5031a278adef4674b1c220b5f8b006.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 9d668ed556efc3f8ab5fccf5dcd19b289f5031a278adef4674b1c220b5f8b006.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2732-115-0x0000000003200000-0x0000000003260000-memory.dmpFilesize
384KB
-
memory/2732-116-0x0000000004D20000-0x0000000004D8B000-memory.dmpFilesize
428KB
-
memory/2732-117-0x0000000000400000-0x0000000002F58000-memory.dmpFilesize
43.3MB
-
memory/2732-118-0x0000000000400000-0x0000000002F58000-memory.dmpFilesize
43.3MB