Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    24-08-2023 05:58

General

  • Target

    9616afef81f7f10a926d59f16e2a0f8d.exe

  • Size

    576KB

  • MD5

    9616afef81f7f10a926d59f16e2a0f8d

  • SHA1

    a536217e42843d952da1ff25b9829d87874279b4

  • SHA256

    844538a01b9dade63ab97b500427ab7b4ce3507cc462953cd81d263edc3aac8b

  • SHA512

    98670fc9d00eaf59f2442b5044cf30ccd54c947dd1d7b54697e3b80dfc91637fbc8f68594c9e70da5f9117a3fa9d07912672f152b5c7474450f66ca94455426f

  • SSDEEP

    12288:g7tautjK5lx2La1Zjxl3zOaHG3YPED7E+BvKGGGNM82q:gJaG+HxCaLj3PG3YPEDRBvtQn

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9616afef81f7f10a926d59f16e2a0f8d.exe
    "C:\Users\Admin\AppData\Local\Temp\9616afef81f7f10a926d59f16e2a0f8d.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2800-0-0x0000000000280000-0x00000000002E0000-memory.dmp

    Filesize

    384KB

  • memory/2800-1-0x00000000002E0000-0x000000000034B000-memory.dmp

    Filesize

    428KB

  • memory/2800-3-0x0000000000400000-0x000000000247E000-memory.dmp

    Filesize

    32.5MB

  • memory/2800-2-0x0000000000400000-0x000000000247E000-memory.dmp

    Filesize

    32.5MB

  • memory/2800-4-0x0000000000280000-0x00000000002E0000-memory.dmp

    Filesize

    384KB

  • memory/2800-5-0x0000000000400000-0x000000000247E000-memory.dmp

    Filesize

    32.5MB

  • memory/2800-6-0x00000000002E0000-0x000000000034B000-memory.dmp

    Filesize

    428KB