Analysis

  • max time kernel
    153s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 02:32

General

  • Target

    3e075f28584e17ac7d0fd0d59ff4f582e8d0a2ecb73144989c15d152e0041fb8.exe

  • Size

    175KB

  • MD5

    6edb83104e660c7ddb33a659b804c5ab

  • SHA1

    72103bbec3f9c3cb2d513f5e0604fbb693822e5b

  • SHA256

    3e075f28584e17ac7d0fd0d59ff4f582e8d0a2ecb73144989c15d152e0041fb8

  • SHA512

    a1180511ec3c84344bf8375ab3d04ba5cbc9295cd69461fd90f922dc6e13b85ed1a53b8846616dd2719efa8b2710ecd481bbf3f762da3c70477b14f3b21147e6

  • SSDEEP

    3072:16KWkWZtUA1x8QKr3gOKICWgPsFnXKwCSWKksSGfvEhF6QbjduH6YoORyWXknd+o:16JkWZtUmSQqwOvCWgPuCSasVfMj6BHa

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e075f28584e17ac7d0fd0d59ff4f582e8d0a2ecb73144989c15d152e0041fb8.exe
    "C:\Users\Admin\AppData\Local\Temp\3e075f28584e17ac7d0fd0d59ff4f582e8d0a2ecb73144989c15d152e0041fb8.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:1664

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1664-132-0x0000000000400000-0x0000000000549000-memory.dmp
    Filesize

    1.3MB