Analysis

  • max time kernel
    147s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-05-2024 00:46

General

  • Target

    DumpUper.exe

  • Size

    686KB

  • MD5

    ce1696485ad018ad2bee84be3875b049

  • SHA1

    49ec38b481f5a946dc6c3d8cfebc9503a7783548

  • SHA256

    5a886bb855189d4f9344f63a2aef3cbcbec4e9dc8afa411721561758cd0e0b46

  • SHA512

    92e2787fdf1b4e24d4d3a3a02ba1327efbd05d83f5de74bec86f1f7b4300728ecb7fe2952562658c8e60e64370944205a558e2569c0dfb74316fddd6c039cc64

  • SSDEEP

    12288:8QGJD2hWogy5E1I4mkdjA06zkRUDWOOdeSnLMmATCZLM0Kf0PJ1Kcs:UXsEawdMkRlBeS4PTC08Jsr

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\DumpUper.exe
    "C:\Users\Admin\AppData\Local\Temp\DumpUper.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    PID:4532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4532-0-0x0000000002C10000-0x0000000002C11000-memory.dmp

    Filesize

    4KB