Analysis

  • max time kernel
    132s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-01-2024 11:30

General

  • Target

    7fbaca93caa96fe0cc79b8c444842dfd.exe

  • Size

    5KB

  • MD5

    7fbaca93caa96fe0cc79b8c444842dfd

  • SHA1

    d54e6a9b312f58474fe35e2c691d2748237abb7f

  • SHA256

    f5dbaee5b0b8eaa64148a0d445d3071dae5006d9a7a006f80f9783229573b0e9

  • SHA512

    0f0517e9cbe97cbf3d3bc2fb2dac1fd2d185da255f78fbe7a5390b2f23fa8cc993144ed21f73bbc001620656eeae2db777593865c3418a5978044c7df878454a

  • SSDEEP

    96:5B7zeuDRR4EFvPxde18dWhBSAgBiVZ9ZdG7yVka9rv:79netBYB6ZTdlkGr

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7fbaca93caa96fe0cc79b8c444842dfd.exe
    "C:\Users\Admin\AppData\Local\Temp\7fbaca93caa96fe0cc79b8c444842dfd.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious behavior: EnumeratesProcesses
    PID:368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads