Analysis
-
max time kernel
121s -
max time network
135s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
21-10-2021 18:02
Static task
static1
Behavioral task
behavioral1
Sample
775f13140a30692525973fc04b537a324d42112ef97582c893c31bda1873e3b7.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
775f13140a30692525973fc04b537a324d42112ef97582c893c31bda1873e3b7.exe
-
Size
584KB
-
MD5
9fccb160e6cce43c1343f650d8c0677d
-
SHA1
f6213d188d0001396905265ba0f747e9a9b20241
-
SHA256
775f13140a30692525973fc04b537a324d42112ef97582c893c31bda1873e3b7
-
SHA512
4f4cb4f0fd65de77f26b7fd19bd2ba5bf69d18465998ec1d2f1654c12a8f86d5231c3861353cb010d29052f439e2ac3778d419a598910906ce746222e9334d24
Score
6/10
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
775f13140a30692525973fc04b537a324d42112ef97582c893c31bda1873e3b7.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 775f13140a30692525973fc04b537a324d42112ef97582c893c31bda1873e3b7.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2768-118-0x0000000004BD0000-0x0000000004C3B000-memory.dmpFilesize
428KB
-
memory/2768-119-0x0000000000400000-0x0000000002F58000-memory.dmpFilesize
43.3MB
-
memory/2768-116-0x0000000004B70000-0x0000000004BD0000-memory.dmpFilesize
384KB
-
memory/2768-117-0x0000000000400000-0x0000000002F58000-memory.dmpFilesize
43.3MB