Analysis

  • max time kernel
    90s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    24-05-2022 14:41

General

  • Target

    18be49398c00055101d49b2e21e2eef9de38799de69a3936f9f8a086701b2220.exe

  • Size

    2.2MB

  • MD5

    18156024ad9310be44e7171f0e2de222

  • SHA1

    0c3b0cffdd6911c5768c78720a1c957c214d46ac

  • SHA256

    18be49398c00055101d49b2e21e2eef9de38799de69a3936f9f8a086701b2220

  • SHA512

    024e7e89ce0e75332af67a4aad38d95f8409a54cc609809b1b34af060059519d868210f792d6bc27d86839976522ca1cba2bd9627dec84927d690658ff6c99c6

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18be49398c00055101d49b2e21e2eef9de38799de69a3936f9f8a086701b2220.exe
    "C:\Users\Admin\AppData\Local\Temp\18be49398c00055101d49b2e21e2eef9de38799de69a3936f9f8a086701b2220.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    PID:2912

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads