Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    24-05-2022 14:02

General

  • Target

    f3f3d43915de67ae7d500f265ecc89b5b25556d8c31751bad3f292abddac11d3.exe

  • Size

    2.2MB

  • MD5

    da6ca74246950487962743ab8e15c3b3

  • SHA1

    595767bdef70f7b91ee68106bf7e1eca02ed5b31

  • SHA256

    f3f3d43915de67ae7d500f265ecc89b5b25556d8c31751bad3f292abddac11d3

  • SHA512

    10deed0f70b6f69a9af71540dc997a1c6ff54f1745265b91b39827f94ebbde9492bde177892ff46297966335a07c8ca8b4e85b3adc6d0079ab65dd8c98642746

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3f3d43915de67ae7d500f265ecc89b5b25556d8c31751bad3f292abddac11d3.exe
    "C:\Users\Admin\AppData\Local\Temp\f3f3d43915de67ae7d500f265ecc89b5b25556d8c31751bad3f292abddac11d3.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    PID:2832

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads