Analysis

  • max time kernel
    43s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-05-2022 03:25

General

  • Target

    2eff10c6153ea10cba3b0719f4526c474236e255ca55ed74f97809445e0a1c22.exe

  • Size

    686KB

  • MD5

    0e782f5f57876f5e1cab16e0d8afb69f

  • SHA1

    cbe4910fba99d721710f836bef90ae05e8879e50

  • SHA256

    2eff10c6153ea10cba3b0719f4526c474236e255ca55ed74f97809445e0a1c22

  • SHA512

    e62403d005e46a1632ae52ef4206a974ee20b4143df35272c80853788bb7bd1b4f660f8e8dc2a3cf48afffc28afceecc6987c46464c0eb7bcbe264ad79ac535d

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2eff10c6153ea10cba3b0719f4526c474236e255ca55ed74f97809445e0a1c22.exe
    "C:\Users\Admin\AppData\Local\Temp\2eff10c6153ea10cba3b0719f4526c474236e255ca55ed74f97809445e0a1c22.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    PID:1156

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1156-54-0x0000000075271000-0x0000000075273000-memory.dmp
    Filesize

    8KB

  • memory/1156-55-0x00000000002F0000-0x0000000000332000-memory.dmp
    Filesize

    264KB