Analysis
-
max time kernel
91s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 03:28
Static task
static1
Behavioral task
behavioral1
Sample
914e66aa088b4826954f9268d19dd2ddb3361f01ee3d01ad97b5642e23691ca4.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
914e66aa088b4826954f9268d19dd2ddb3361f01ee3d01ad97b5642e23691ca4.exe
Resource
win10v2004-20220414-en
General
-
Target
914e66aa088b4826954f9268d19dd2ddb3361f01ee3d01ad97b5642e23691ca4.exe
-
Size
11KB
-
MD5
3e0b3cf14b385579e19b25dc0b20cefb
-
SHA1
5b159cf79dbacd892e56ebe7b7417df51319f87e
-
SHA256
914e66aa088b4826954f9268d19dd2ddb3361f01ee3d01ad97b5642e23691ca4
-
SHA512
017285e0d16e91b93f8a7b7454e89218c0cc71021d0f736f02e377d32c953f50fbff58e1fed4d090b75275ff41c6834acaf3a964b737049bb1333de4376273c7
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
914e66aa088b4826954f9268d19dd2ddb3361f01ee3d01ad97b5642e23691ca4.exedescription ioc process File opened for modification \??\PhysicalDrive0 914e66aa088b4826954f9268d19dd2ddb3361f01ee3d01ad97b5642e23691ca4.exe