Analysis
-
max time kernel
62s -
max time network
68s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 01:31
Static task
static1
Behavioral task
behavioral1
Sample
bootdata.exe
Resource
win10v2004-20220901-en
1 signatures
1800 seconds
General
-
Target
bootdata.exe
-
Size
8KB
-
MD5
0a78174420568e5aff0b81ec0050deef
-
SHA1
5acead5f8cd93ad5dbf7dd3044d82f1d937aab5f
-
SHA256
8413c7496ca732666d112ca9d565560a8563b4a1614e8eeeeade360156604e0b
-
SHA512
49a0a19d2fa3dd09d822fbb46c0bf8cb55c7a2a75a997b25949b5a343586a27c0fb2113718edcf7d32643e48df6554c5e4d3ba288dd459f1f0c8d649460834e8
-
SSDEEP
192:EqK0Y1xMew6EjI6b08a7W2f5tgN1eo2Ypv:EqKwTk67a7W2I2Ypv
Score
6/10
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 bootdata.exe File opened for modification \??\PhysicalDrive0 bootdata.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bootdata.exe"C:\Users\Admin\AppData\Local\Temp\bootdata.exe"1⤵
- Writes to the Master Boot Record (MBR)
PID:4060
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\bootdata.exe"C:\Users\Admin\AppData\Local\Temp\bootdata.exe"1⤵
- Writes to the Master Boot Record (MBR)
PID:4756