Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/06/2024, 09:08

General

  • Target

    1b356fe1a4c2d58f38a49b2a1b5780e9c450a96291ed02c5b5600dec4f2a1f8a.exe

  • Size

    63KB

  • MD5

    ed6ed99859cdfbc36c13d9fcd9f44bdd

  • SHA1

    a92c27713902e2e84992421c309728fc52fa9bc6

  • SHA256

    1b356fe1a4c2d58f38a49b2a1b5780e9c450a96291ed02c5b5600dec4f2a1f8a

  • SHA512

    3c3321e896416cb5f4904787e1fea272a892f036b4c56237dae3f4e7bf03bbb97b634719d4351adb2450706ce9df18e1b7702db9b1c1b1c9adeb112972cf4ff3

  • SSDEEP

    768:1gppKFDevoOTv2j2ezkv6ouYZuHMrlNJ3FvtwZWWcZ5GFHpzcQaJEhGxuB/u5dd:ahdi4xuRHMx16KZ5WH9bhP/ujd

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b356fe1a4c2d58f38a49b2a1b5780e9c450a96291ed02c5b5600dec4f2a1f8a.exe
    "C:\Users\Admin\AppData\Local\Temp\1b356fe1a4c2d58f38a49b2a1b5780e9c450a96291ed02c5b5600dec4f2a1f8a.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    PID:1168

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1168-0-0x0000000009000000-0x0000000009012000-memory.dmp

          Filesize

          72KB

        • memory/1168-1-0x0000000009000000-0x0000000009012000-memory.dmp

          Filesize

          72KB

        • memory/1168-3-0x00000000005F0000-0x00000000005F8000-memory.dmp

          Filesize

          32KB

        • memory/1168-2-0x0000000000570000-0x00000000005E4000-memory.dmp

          Filesize

          464KB

        • memory/1168-4-0x0000000002110000-0x0000000002162000-memory.dmp

          Filesize

          328KB

        • memory/1168-9-0x0000000009000000-0x0000000009012000-memory.dmp

          Filesize

          72KB

        • memory/1168-16-0x00000000022C0000-0x00000000022D6000-memory.dmp

          Filesize

          88KB

        • memory/1168-20-0x00000000022E0000-0x00000000022E8000-memory.dmp

          Filesize

          32KB

        • memory/1168-21-0x0000000002720000-0x0000000002778000-memory.dmp

          Filesize

          352KB

        • memory/1168-19-0x0000000002170000-0x000000000217E000-memory.dmp

          Filesize

          56KB

        • memory/1168-18-0x0000000002340000-0x00000000023D1000-memory.dmp

          Filesize

          580KB

        • memory/1168-17-0x0000000002300000-0x0000000002332000-memory.dmp

          Filesize

          200KB

        • memory/1168-14-0x00000000022A0000-0x00000000022B6000-memory.dmp

          Filesize

          88KB

        • memory/1168-13-0x0000000000600000-0x0000000000611000-memory.dmp

          Filesize

          68KB

        • memory/1168-12-0x0000000002110000-0x0000000002162000-memory.dmp

          Filesize

          328KB

        • memory/1168-15-0x0000000000620000-0x0000000000630000-memory.dmp

          Filesize

          64KB

        • memory/1168-22-0x0000000009000000-0x0000000009012000-memory.dmp

          Filesize

          72KB

        • memory/1168-35-0x0000000009000000-0x0000000009012000-memory.dmp

          Filesize

          72KB

        • memory/1168-48-0x0000000009000000-0x0000000009012000-memory.dmp

          Filesize

          72KB

        • memory/1168-61-0x0000000009000000-0x0000000009012000-memory.dmp

          Filesize

          72KB