Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 03:25
Static task
static1
Behavioral task
behavioral1
Sample
2eff10c6153ea10cba3b0719f4526c474236e255ca55ed74f97809445e0a1c22.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2eff10c6153ea10cba3b0719f4526c474236e255ca55ed74f97809445e0a1c22.exe
Resource
win10v2004-20220414-en
General
-
Target
2eff10c6153ea10cba3b0719f4526c474236e255ca55ed74f97809445e0a1c22.exe
-
Size
686KB
-
MD5
0e782f5f57876f5e1cab16e0d8afb69f
-
SHA1
cbe4910fba99d721710f836bef90ae05e8879e50
-
SHA256
2eff10c6153ea10cba3b0719f4526c474236e255ca55ed74f97809445e0a1c22
-
SHA512
e62403d005e46a1632ae52ef4206a974ee20b4143df35272c80853788bb7bd1b4f660f8e8dc2a3cf48afffc28afceecc6987c46464c0eb7bcbe264ad79ac535d
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
2eff10c6153ea10cba3b0719f4526c474236e255ca55ed74f97809445e0a1c22.exedescription ioc process File opened for modification \??\PhysicalDrive0 2eff10c6153ea10cba3b0719f4526c474236e255ca55ed74f97809445e0a1c22.exe