Analysis
-
max time kernel
132s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 11:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7fbaca93caa96fe0cc79b8c444842dfd.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
7fbaca93caa96fe0cc79b8c444842dfd.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
7fbaca93caa96fe0cc79b8c444842dfd.exe
-
Size
5KB
-
MD5
7fbaca93caa96fe0cc79b8c444842dfd
-
SHA1
d54e6a9b312f58474fe35e2c691d2748237abb7f
-
SHA256
f5dbaee5b0b8eaa64148a0d445d3071dae5006d9a7a006f80f9783229573b0e9
-
SHA512
0f0517e9cbe97cbf3d3bc2fb2dac1fd2d185da255f78fbe7a5390b2f23fa8cc993144ed21f73bbc001620656eeae2db777593865c3418a5978044c7df878454a
-
SSDEEP
96:5B7zeuDRR4EFvPxde18dWhBSAgBiVZ9ZdG7yVka9rv:79netBYB6ZTdlkGr
Score
6/10
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 7fbaca93caa96fe0cc79b8c444842dfd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 368 7fbaca93caa96fe0cc79b8c444842dfd.exe