Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 11:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
diskpart.exe
Resource
win10v2004-20240419-en
1 signatures
150 seconds
General
-
Target
diskpart.exe
-
Size
172KB
-
MD5
8dd903090918bc30c309df8e80903e64
-
SHA1
cfd346ea5273dbe80ff3af86d1c4bc941db9a957
-
SHA256
9d4e56e564c9921c0e054353a1eda982ea9ff676688ecab7222295647b164807
-
SHA512
ea423878887a01e6b51784ed375c46f998c5d187e002d4a978f873df4a3b81819847b70fd04004211250061a81e8426d4caf6340198f9bd4babfdb95f919fc50
-
SSDEEP
3072:up751cbzLiS34vyOvDR+uldSLXKNuKmdvHm8CEIvPuU/vmKNUHPhx153:up7516zm/KyDRnTSzzfm8CnX3Q
Score
1/10
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\diskpart.exe"C:\Users\Admin\AppData\Local\Temp\diskpart.exe"1⤵PID:5116
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:4480
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:2844