Analysis
-
max time kernel
90s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
26-05-2022 21:54
Static task
static1
Behavioral task
behavioral1
Sample
be88fd4614a634205229448e2931d13d1690f8484e7e81c13ebb5173b0cc7b1a.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
be88fd4614a634205229448e2931d13d1690f8484e7e81c13ebb5173b0cc7b1a.exe
-
Size
535KB
-
MD5
d5f13a08f9a3f674a4f11b7dc73684d0
-
SHA1
b79501febface8efcd1c81e381923aac4d881a56
-
SHA256
be88fd4614a634205229448e2931d13d1690f8484e7e81c13ebb5173b0cc7b1a
-
SHA512
66bedf8a803efdf3f1b88819ea3e712260fad36dab6ddf75e1f4b9495ae1410e8a85bcfb85874e00e2f49f9803c1b0b30e6d5be67e651645a5ca1183086be7d9
Score
6/10
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
be88fd4614a634205229448e2931d13d1690f8484e7e81c13ebb5173b0cc7b1a.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 be88fd4614a634205229448e2931d13d1690f8484e7e81c13ebb5173b0cc7b1a.exe