Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02-03-2024 23:32

General

  • Target

    Trojan/10reset/10reset-helper.exe

  • Size

    47KB

  • MD5

    60033da4432b2614f8452a6f47680ae4

  • SHA1

    ac980dc48fc90a6b1ed383777e55c2338f79e451

  • SHA256

    1c75668ea50a19a9351d410d52cae0d7937f115df5b0c35367016739113ed461

  • SHA512

    7e2cdf114194d639acc399c82335b4e608c729be56d091eb912a0613b089e9cace1edc3efccdd3ee85f76156e775d006d2fe53fb13cf8b4cc8cfedcd84f0c445

  • SSDEEP

    768:9yLqzcQ8zwtHEBbGoaPbs9IKRQ5qo2GLQdJ274ztOyjg5YCtKO:cLqzcQ5kJxWpKRfzdJhIyjg57K

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Trojan\10reset\10reset-helper.exe
    "C:\Users\Admin\AppData\Local\Temp\Trojan\10reset\10reset-helper.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    PID:1444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1444-0-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB