Analysis

  • max time kernel
    139s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/05/2024, 20:32

General

  • Target

    DANFE042024983859304603550.pdf.vhd

  • Size

    6.0MB

  • MD5

    38162b653044b81ec2d249aeff3cc65a

  • SHA1

    08bd49a67d16333b91b539daa96e392517e9607d

  • SHA256

    f3f99877cb49a053d8d67464b0b5dc9c992efa72bbd3e6259e89da44c445937f

  • SHA512

    0a33ad7f8564b3759fb2b24d807f87bbe3b1c5cde9cca395059ea515f0f91d5e46d2c0f7ea9ba233718fb2c28fd0f59f359fd930a76546f01a6b54ab411fda25

  • SSDEEP

    12288:qmTHNXNZDbiArSvK00IPVH9dq0vFN1c75gIkvAPYisqXMd73wOnqARP0Hob05AU:qm7N9/rSvFddq0pzi9Xg

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\DANFE042024983859304603550.pdf.vhd
    1⤵
    • Modifies registry class
    PID:4548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads