Analysis

  • max time kernel
    41s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 12:54

General

  • Target

    5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe

  • Size

    727KB

  • MD5

    0c3fbb0c1483737752ac07d65a807eb0

  • SHA1

    a2448905040cde015afbce6d0875f2d0b47ca272

  • SHA256

    5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04

  • SHA512

    f4a09216d83ea2536aec7a31ad623170f5d8bbfcb54bbbb915bb99e519984bee9c8061e7163f74907e44423d204ff2926fd5989084443dea5de2db1961c146cb

  • SSDEEP

    12288:rwECaUglPnFsk7P0UahDyDT1qBRXjIjpitNxpJ:rwEC70qkgUahDuER1NJ

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe
    "C:\Users\Admin\AppData\Local\Temp\5a7fe7f0dc2ca872890525a53d89351dc82fef906fbf7fcb64ebb83ef5059b04.exe"
    1⤵
    • Enumerates connected drives
    • Writes to the Master Boot Record (MBR)
    PID:1904

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1904-54-0x0000000000400000-0x00000000004BA000-memory.dmp

          Filesize

          744KB

        • memory/1904-55-0x0000000076DC1000-0x0000000076DC3000-memory.dmp

          Filesize

          8KB