Analysis
-
max time kernel
90s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 03:09
Static task
static1
Behavioral task
behavioral1
Sample
f1ddca522134912d029f2993da57a7fb210e8172f02ba714beed1d931b3008a9.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
f1ddca522134912d029f2993da57a7fb210e8172f02ba714beed1d931b3008a9.exe
Resource
win10v2004-20220414-en
General
-
Target
f1ddca522134912d029f2993da57a7fb210e8172f02ba714beed1d931b3008a9.exe
-
Size
600KB
-
MD5
5695860ffa2c7228e60e8778a4fbd348
-
SHA1
b6b6f6ef8ad9afefcc2819ae1870958643808001
-
SHA256
f1ddca522134912d029f2993da57a7fb210e8172f02ba714beed1d931b3008a9
-
SHA512
59fe118266122f684c4081c6c06b3585e5b5c29cefc7f8766cd1c5be06e9fd4f79559ab72e7e117a25513970b6820ee052d59fd35a55a72ac91e69c07287d20a
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
f1ddca522134912d029f2993da57a7fb210e8172f02ba714beed1d931b3008a9.exedescription ioc process File opened for modification \??\PhysicalDrive0 f1ddca522134912d029f2993da57a7fb210e8172f02ba714beed1d931b3008a9.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
f1ddca522134912d029f2993da57a7fb210e8172f02ba714beed1d931b3008a9.exepid process 4156 f1ddca522134912d029f2993da57a7fb210e8172f02ba714beed1d931b3008a9.exe 4156 f1ddca522134912d029f2993da57a7fb210e8172f02ba714beed1d931b3008a9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1ddca522134912d029f2993da57a7fb210e8172f02ba714beed1d931b3008a9.exe"C:\Users\Admin\AppData\Local\Temp\f1ddca522134912d029f2993da57a7fb210e8172f02ba714beed1d931b3008a9.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx