Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
17/01/2024, 23:39
Behavioral task
behavioral1
Sample
63ea8b577564d8adbe10a1160666b9b0.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
63ea8b577564d8adbe10a1160666b9b0.exe
Resource
win10v2004-20231222-en
1 signatures
150 seconds
General
-
Target
63ea8b577564d8adbe10a1160666b9b0.exe
-
Size
216KB
-
MD5
63ea8b577564d8adbe10a1160666b9b0
-
SHA1
53d4b71422b93bf8b2cd4a4f0c901aef7fa9f94b
-
SHA256
7933e599a6d1c22b4ba5ecbef6fa1bef3a28a3507609ab6c3ba5a625b6b25c1f
-
SHA512
632e01dde4850a293ee8fe63f124019bd18655130dce4959648e38330f83f1ef96dadc2b6c17731fbf1c27f240e460eba529914afed0bba51e73ccb800ecbb68
-
SSDEEP
6144:YGCactEMms0bC/CG98gWNlPTGQQm6agrdD:FCpD0bxNtTirdD
Score
6/10
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 63ea8b577564d8adbe10a1160666b9b0.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2288 63ea8b577564d8adbe10a1160666b9b0.exe 2288 63ea8b577564d8adbe10a1160666b9b0.exe