Analysis

  • max time kernel
    148s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28-06-2024 18:39

General

  • Target

    0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe

  • Size

    184KB

  • MD5

    790f80137facbfc6145fc5f02ab5612e

  • SHA1

    239d5f2302d33580e9c8645a996fe74f90f65bab

  • SHA256

    0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6

  • SHA512

    3cd7c516acb6cf3e4cc5ae4475027b45de7762e5e36abf1072cda5a3338c1bbb752c97d4fe44225ef41bda04f031f44bb2a1c5ceb75a6c713fcd49a0e7cc991d

  • SSDEEP

    3072:IZh9wv1s6PTkL+bhc3KaTOBVCmpD2UkXIFaBAjEmRmJofXTij9sPU2hbE59:cQ1hb4+ba3KjBVFJ2CgBAjDmJFsU2hbe

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe
    "C:\Users\Admin\AppData\Local\Temp\0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops autorun.inf file
    PID:1244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • F:\kbllptgp.exe

    Filesize

    184KB

    MD5

    5c83651cc5afb09157ceefc3f70bd3b2

    SHA1

    627aee328387d8c494828de0a1602a030107ea83

    SHA256

    2cba70085de94c0e750de74e103af47d17d7b40a1b79b3307505aa0f6cf500b0

    SHA512

    acba9e674b33f6d6993728e9bba5da75150de15155011206fb9cc4fa309495519626b5a75b0f76a62f9a97b425f6771dfd4187831dcdd96daf985ed280007dd1

  • memory/1244-5-0x0000000000020000-0x0000000000039000-memory.dmp

    Filesize

    100KB

  • memory/1244-9-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1244-14-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1244-23-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1244-29-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1244-35-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1244-39-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB