Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 18:39
Static task
static1
Behavioral task
behavioral1
Sample
0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe
Resource
win10v2004-20240508-en
General
-
Target
0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe
-
Size
184KB
-
MD5
790f80137facbfc6145fc5f02ab5612e
-
SHA1
239d5f2302d33580e9c8645a996fe74f90f65bab
-
SHA256
0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6
-
SHA512
3cd7c516acb6cf3e4cc5ae4475027b45de7762e5e36abf1072cda5a3338c1bbb752c97d4fe44225ef41bda04f031f44bb2a1c5ceb75a6c713fcd49a0e7cc991d
-
SSDEEP
3072:IZh9wv1s6PTkL+bhc3KaTOBVCmpD2UkXIFaBAjEmRmJofXTij9sPU2hbE59:cQ1hb4+ba3KjBVFJ2CgBAjDmJFsU2hbe
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\kbllptgp.exe" 0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe File opened (read-only) \??\I: 0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe File opened (read-only) \??\S: 0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe File opened (read-only) \??\T: 0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe File opened (read-only) \??\W: 0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe File opened (read-only) \??\X: 0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe File opened (read-only) \??\U: 0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe File opened (read-only) \??\E: 0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe File opened (read-only) \??\J: 0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe File opened (read-only) \??\K: 0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe File opened (read-only) \??\M: 0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe File opened (read-only) \??\O: 0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe File opened (read-only) \??\P: 0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe File opened (read-only) \??\A: 0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe File opened (read-only) \??\G: 0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe File opened (read-only) \??\N: 0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe File opened (read-only) \??\Q: 0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe File opened (read-only) \??\R: 0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe File opened (read-only) \??\Z: 0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe File opened (read-only) \??\B: 0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe File opened (read-only) \??\L: 0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe File opened (read-only) \??\V: 0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe File opened (read-only) \??\Y: 0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\autorun.inf 0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe"C:\Users\Admin\AppData\Local\Temp\0f56d40cdedc3a25a90408f4c5535af16cbb6341f7e63855670f24886c18f0a6.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops autorun.inf file
PID:1244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD55c83651cc5afb09157ceefc3f70bd3b2
SHA1627aee328387d8c494828de0a1602a030107ea83
SHA2562cba70085de94c0e750de74e103af47d17d7b40a1b79b3307505aa0f6cf500b0
SHA512acba9e674b33f6d6993728e9bba5da75150de15155011206fb9cc4fa309495519626b5a75b0f76a62f9a97b425f6771dfd4187831dcdd96daf985ed280007dd1