Analysis

  • max time kernel
    112s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    11-06-2022 16:29

General

  • Target

    driverexportpe.exe

  • Size

    347KB

  • MD5

    b8eef7ec00336358f41b4e28da99b070

  • SHA1

    543be112a811f851f80266393a5a857c272152a3

  • SHA256

    ac5d2e64bf99e9b5d86626ab6ab7bca59cc18c072759baa5fe3267ec1326aab0

  • SHA512

    0fe70144c300406ca4e4c27b789e1135f1a174923cf7e412a216b47de6951cac3d1a47d06b97891bbe6b09180be59cba62f8d6f497969eb7399d407da5311e99

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\driverexportpe.exe
    "C:\Users\Admin\AppData\Local\Temp\driverexportpe.exe"
    1⤵
    • Enumerates connected drives
    PID:2404

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2404-130-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB

  • memory/2404-131-0x0000000000400000-0x00000000004D1000-memory.dmp

    Filesize

    836KB