Analysis
-
max time kernel
91s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 08:07
Static task
static1
Behavioral task
behavioral1
Sample
93f778d0.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
93f778d0.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
93f778d0.exe
-
Size
603KB
-
MD5
a3f1b39d00d1fdfbdd8068953ac1ec55
-
SHA1
b557e369672d93e847f2810d825179ceeb7f61ef
-
SHA256
dd8322e16aae80892bdaf875be0779e083780d31d19a51f2431e632cf19579cd
-
SHA512
f63b846e4fe0749e327d3a82aa54391ff13ad3d44732bf451cbe888f831bbbc8fbe8e8309ee04d5250ca95146b57f954a045c7ddaa7675c89ca8dc0030e15a7c
Score
6/10
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
93f778d0.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 93f778d0.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4776-130-0x0000000000400000-0x0000000002BB3000-memory.dmpFilesize
39.7MB
-
memory/4776-131-0x0000000002E0D000-0x0000000002E6E000-memory.dmpFilesize
388KB
-
memory/4776-132-0x0000000002D50000-0x0000000002DBB000-memory.dmpFilesize
428KB
-
memory/4776-133-0x0000000000400000-0x0000000002BB3000-memory.dmpFilesize
39.7MB