Resubmissions

28-01-2021 15:57

210128-67ypcjhja2 10

28-01-2021 14:59

210128-f7kbeh6gys 10

Analysis

  • max time kernel
    560s
  • max time network
    562s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    28-01-2021 15:57

General

  • Target

    sdf.exe

  • Size

    25KB

  • MD5

    7e061f92fd4e38ecaaea9335597d0379

  • SHA1

    8fb58404332ae956307e8ba5ec88e71000386bc2

  • SHA256

    ce8c56d52e1f156e13071b65cc73794b143f3f3714a26166e6600023b81ee2fd

  • SHA512

    95e46e33bbd9b4f099163d9b5216c7cdcec0b4330c8f76da6723a5f746dd3d0e276a01ffe5e6d331cdc7b53f5228ed6391ee01bced547da72771e10a038be40a

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

Processes

  • C:\Users\Admin\AppData\Local\Temp\sdf.exe
    "C:\Users\Admin\AppData\Local\Temp\sdf.exe"
    1⤵
    • Enumerates connected drives
    PID:580

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads