Analysis
-
max time kernel
54s -
max time network
146s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
27-05-2022 06:38
Static task
static1
Behavioral task
behavioral1
Sample
74bb78354743cf5af1e40fa33e4afd693ddd6e202251e4f7e35bb5161100ba2b.exe
Resource
win10-20220414-en
windows10_x64
0 signatures
0 seconds
General
-
Target
74bb78354743cf5af1e40fa33e4afd693ddd6e202251e4f7e35bb5161100ba2b.exe
-
Size
625KB
-
MD5
058021d2ced25aa7acaf9859aba0c148
-
SHA1
d8927443a160a81c7091830867dabb32239df995
-
SHA256
74bb78354743cf5af1e40fa33e4afd693ddd6e202251e4f7e35bb5161100ba2b
-
SHA512
ed2f2c325f36c65473482340f1e69cb6266d1c856c2407b45c6291b44a2c44c33aac7a421056ccf8f63fde78b8e517f18ebfc717af582ebc06a9470fdb3cf9b4
Score
6/10
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
74bb78354743cf5af1e40fa33e4afd693ddd6e202251e4f7e35bb5161100ba2b.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 74bb78354743cf5af1e40fa33e4afd693ddd6e202251e4f7e35bb5161100ba2b.exe