Analysis

  • max time kernel
    241s
  • max time network
    270s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28/12/2023, 22:40

General

  • Target

    fd6c293c6d2491b33cc7b8d567a74f40.exe

  • Size

    502KB

  • MD5

    fd6c293c6d2491b33cc7b8d567a74f40

  • SHA1

    ae4fbfda9330455dbd2a050024c471ed52c0a646

  • SHA256

    4580ed75e12dab2ffb87d5d4631d4c9f9b01ea4d4a1a31657f970df5fe4e49ba

  • SHA512

    286942290f13f932614a53c16b7e5dd6a21d6d09b387ae558e2c493442e7a7f93936ebb03da3e0777f56f0309cadb9dac415f0dc534986e9b2918f75749d5d49

  • SSDEEP

    12288:ndrajxZ5awl7DW/HgoWHBXhZLqh0nUHtiK7:na7DWIXGhCUHl7

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd6c293c6d2491b33cc7b8d567a74f40.exe
    "C:\Users\Admin\AppData\Local\Temp\fd6c293c6d2491b33cc7b8d567a74f40.exe"
    1⤵
    • Enumerates connected drives
    • Writes to the Master Boot Record (MBR)
    PID:2648

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2648-0-0x0000000000400000-0x0000000000482000-memory.dmp

          Filesize

          520KB