Analysis

  • max time kernel
    113s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/01/2024, 05:17

General

  • Target

    3ffd906ae97c10705ca0e33e46274c09.exe

  • Size

    121KB

  • MD5

    3ffd906ae97c10705ca0e33e46274c09

  • SHA1

    3cb084219ee022ab53d1854c04070e057dda1c7e

  • SHA256

    5f839d64f19c2a05b2de68227400a3747eec1f517abd0d9ddbb164d7f591ee43

  • SHA512

    08cce4b55fc2fc5c65fccff515b2c927e00cdd029455ce8f61eb2bb320aef36a360a2b9cc703d624694ac6d2c0be132079f7be17973a71c5926ccdaeecf42b80

  • SSDEEP

    1536:81koYuv0Sta8Xv2LraZYHDzc1AgZ65zIP/J8x/iC5ul:9u15XvcuiHgci2qC5u

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ffd906ae97c10705ca0e33e46274c09.exe
    "C:\Users\Admin\AppData\Local\Temp\3ffd906ae97c10705ca0e33e46274c09.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops autorun.inf file
    • Modifies registry class
    PID:3688

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3688-0-0x0000000000400000-0x0000000000437000-memory.dmp

          Filesize

          220KB