Analysis

  • max time kernel
    151s
  • max time network
    26s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/01/2024, 05:17

General

  • Target

    3ffd906ae97c10705ca0e33e46274c09.exe

  • Size

    121KB

  • MD5

    3ffd906ae97c10705ca0e33e46274c09

  • SHA1

    3cb084219ee022ab53d1854c04070e057dda1c7e

  • SHA256

    5f839d64f19c2a05b2de68227400a3747eec1f517abd0d9ddbb164d7f591ee43

  • SHA512

    08cce4b55fc2fc5c65fccff515b2c927e00cdd029455ce8f61eb2bb320aef36a360a2b9cc703d624694ac6d2c0be132079f7be17973a71c5926ccdaeecf42b80

  • SSDEEP

    1536:81koYuv0Sta8Xv2LraZYHDzc1AgZ65zIP/J8x/iC5ul:9u15XvcuiHgci2qC5u

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ffd906ae97c10705ca0e33e46274c09.exe
    "C:\Users\Admin\AppData\Local\Temp\3ffd906ae97c10705ca0e33e46274c09.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops autorun.inf file
    PID:2928

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • F:\autorun.inf

          Filesize

          34B

          MD5

          b5e1f55f1cd449fe8e75be725366a213

          SHA1

          f4bcb82f8eb7053ce989060dbb3db98aa1e9219c

          SHA256

          81d81351e54dfe3ea1da905981c403683ba0d9412216066bfefb20e0bf97bdcd

          SHA512

          88201b0421bcf9816d8462b7ffab4f50e4e8f8db4533f02f9b4e9939da8127259e5119a346e347dff77275e21254c6a518223107a43e6382d7e89a61f78801ad

        • memory/2928-0-0x0000000000400000-0x0000000000437000-memory.dmp

          Filesize

          220KB