Analysis
-
max time kernel
26s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 03:16
Static task
static1
Behavioral task
behavioral1
Sample
0558263c4d60cdfafea2d1725385218d1eb26219ed1646008ce571bb89809c7d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0558263c4d60cdfafea2d1725385218d1eb26219ed1646008ce571bb89809c7d.exe
Resource
win10v2004-20220414-en
General
-
Target
0558263c4d60cdfafea2d1725385218d1eb26219ed1646008ce571bb89809c7d.exe
-
Size
115KB
-
MD5
1c2e8e747cc72b83515852b41d269203
-
SHA1
23b760af0496c012ecb4c56074f19bf225b22282
-
SHA256
0558263c4d60cdfafea2d1725385218d1eb26219ed1646008ce571bb89809c7d
-
SHA512
305d174d7341c476f470f923be0ff980878ef650e7bd0a7b800e84101d002cdddcc8739c4e30ae09966596e602f43905bc8e575d252a7b5383e4bc02c7782bb4
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
0558263c4d60cdfafea2d1725385218d1eb26219ed1646008ce571bb89809c7d.exedescription ioc process File opened for modification \??\PhysicalDrive0 0558263c4d60cdfafea2d1725385218d1eb26219ed1646008ce571bb89809c7d.exe