Analysis

  • max time kernel
    70s
  • max time network
    78s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-06-2024 03:00

General

  • Target

    de42269a7ffb1becf2fced32c751bf338a36cb58a834e33cd9da839d9fcc7261.exe

  • Size

    219KB

  • MD5

    1d4d4f53632411d5c532e3a2589f02df

  • SHA1

    8e709b482d61b92888f2a967b883eedd099295cf

  • SHA256

    de42269a7ffb1becf2fced32c751bf338a36cb58a834e33cd9da839d9fcc7261

  • SHA512

    858af851f67fc8bbb3ef795f23efd22e18531e211e0a7bb8fc65342b455e5bc9b296f14ca752fafd723017e9005dab46ff6ca92dfc6831a4f1cf5477581695b2

  • SSDEEP

    3072:/2RaiKg4xmUh1WXHqw/l+qmOELhakVsm3mxB32tLEv8zfdn5f2dZLCoKOhh9K0Ke:/0KgGwHqwOOELha+sm2D2+UhngNHK41F

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\de42269a7ffb1becf2fced32c751bf338a36cb58a834e33cd9da839d9fcc7261.exe
    "C:\Users\Admin\AppData\Local\Temp\de42269a7ffb1becf2fced32c751bf338a36cb58a834e33cd9da839d9fcc7261.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    PID:4352

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Replay Monitor

Loading Replay Monitor...

Downloads