Analysis

  • max time kernel
    140s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/07/2024, 16:28

General

  • Target

    Perm Unban/HardDisk.exe

  • Size

    636KB

  • MD5

    c20e96d4e616ce333c19a1c15a1cc137

  • SHA1

    f79645ec115130ee59958c55a556f564260b7a9e

  • SHA256

    2c141c06f7df57f11ef2c62f2a96093484a65df47065b1a475c53784af0e2664

  • SHA512

    519fec9955c4a18e45ec68d9e7dc2bcda74721a6ea088e59e634e26b136bfa15f5efedf8839c036a3cfdcdb9780a2121dc2d71f1fdbbfd3df02d9969e5db753b

  • SSDEEP

    12288:EN1TNRzUSWgDxPWnP0Lamg+hyMU1EUFT99qpDDcZDDR5Id1888888888888W888H:whNRASWgDxPWnP0LamWYC8EOd

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Perm Unban\HardDisk.exe
    "C:\Users\Admin\AppData\Local\Temp\Perm Unban\HardDisk.exe"
    1⤵
    • Enumerates connected drives
    PID:3356

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3356-0-0x00000000023E0000-0x00000000023E1000-memory.dmp

          Filesize

          4KB

        • memory/3356-1-0x0000000000400000-0x00000000004AA000-memory.dmp

          Filesize

          680KB

        • memory/3356-3-0x00000000023E0000-0x00000000023E1000-memory.dmp

          Filesize

          4KB