Analysis
-
max time kernel
35s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 11:30
Static task
static1
Behavioral task
behavioral1
Sample
17c94c952a847fa0300245a19bcc10d33704bdb8fe2d21839ffe5732e9701311.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
17c94c952a847fa0300245a19bcc10d33704bdb8fe2d21839ffe5732e9701311.exe
Resource
win10v2004-20220414-en
General
-
Target
17c94c952a847fa0300245a19bcc10d33704bdb8fe2d21839ffe5732e9701311.exe
-
Size
2.3MB
-
MD5
7bae13db6fd41baa49dd7fe42a74ebec
-
SHA1
24e451e031681c4577fe609023b4df00e3c77325
-
SHA256
17c94c952a847fa0300245a19bcc10d33704bdb8fe2d21839ffe5732e9701311
-
SHA512
67a23080f7c88374d13d22df00c124899ddebb5361d587fa7281e17247617ed74b9187a1a48bfbaaf93d9a6e0904d17afc1c5eb5b46d98ea00c7fccbd4bfecec
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
17c94c952a847fa0300245a19bcc10d33704bdb8fe2d21839ffe5732e9701311.exedescription ioc process File opened for modification \??\PhysicalDrive0 17c94c952a847fa0300245a19bcc10d33704bdb8fe2d21839ffe5732e9701311.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1348-54-0x0000000076531000-0x0000000076533000-memory.dmpFilesize
8KB