Analysis
-
max time kernel
52s -
max time network
73s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
26-05-2022 05:15
Static task
static1
Behavioral task
behavioral1
Sample
1de7c5e6b6005acbc13e4d31cf0d0ac0f5b1e85125e340594467028861e97f5c.exe
Resource
win10-20220414-en
windows10_x64
0 signatures
0 seconds
General
-
Target
1de7c5e6b6005acbc13e4d31cf0d0ac0f5b1e85125e340594467028861e97f5c.exe
-
Size
627KB
-
MD5
c7419936f5da5ecaea2f788259db122b
-
SHA1
ba6951d1840adabcb43928ef1ac88147b4c440d7
-
SHA256
1de7c5e6b6005acbc13e4d31cf0d0ac0f5b1e85125e340594467028861e97f5c
-
SHA512
3b41242c33b3de103cecc723b05df840ae9fd2b2f97f1290bae79ccebe6714707823b93d2d06d23327b535dee8987a764ad778dcd7307a737d933e0c468341e0
Score
6/10
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
1de7c5e6b6005acbc13e4d31cf0d0ac0f5b1e85125e340594467028861e97f5c.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 1de7c5e6b6005acbc13e4d31cf0d0ac0f5b1e85125e340594467028861e97f5c.exe