Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2024, 19:44

General

  • Target

    aad173f35bd54cd134a556a868dfc314.exe

  • Size

    151KB

  • MD5

    aad173f35bd54cd134a556a868dfc314

  • SHA1

    06b1b11ad53ff1f5e88ff782f42ada6f89df13a5

  • SHA256

    46ca793a3a37e0ca9268c7f6b0e31b35db89792f6a95e6ea0f40b0de819687ba

  • SHA512

    28d25e0fe717a3bb5d89a7f5f04b486c374206ba9679ae236f6105204d037bb19c94d15102d06e82617b9dd38ab0830fe966e8fd6a9a3c83a8686d0fdcdf614d

  • SSDEEP

    3072:zxJ4be9MbCNEVyPjH7IE2KawoZixHJSYxQzhFXsT:9IbAEVyPDhcep12q

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aad173f35bd54cd134a556a868dfc314.exe
    "C:\Users\Admin\AppData\Local\Temp\aad173f35bd54cd134a556a868dfc314.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    PID:2216

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • F:\zPharaoh.exe

          Filesize

          32KB

          MD5

          d86356e88f3f34fc4978afc743b6cd3b

          SHA1

          0a03231bc6010b54ef38c401eca2391438b11147

          SHA256

          ccc5d8e2eb63c1c1b7b56450c81c91c467bf617f0eb050882c091a94299d5b19

          SHA512

          ab652a90322c9e597dd555b30516b1570f7b0070137ab32dcffbcc977ff87c51e4806dae7cbc257a18f8ff7fae30aad6f8c55b3ef6c738444e43f0006e30922c

        • memory/2216-34-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2216-0-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB