Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    03/08/2024, 01:06

General

  • Target

    ventoy-1.0.99/Ventoy2Disk.exe

  • Size

    589KB

  • MD5

    f8d95eb8c84c6de968a90496256180b1

  • SHA1

    52ec2c2d0dfb4e0ee4cacf58c06308673caf7535

  • SHA256

    d0fbb98b3de71b571276016743d1a2b56fc71b8708455a533a7489fdb64e63de

  • SHA512

    0b2a33093ecab5307c496283bec5d8fcd40a53921b7f73ea643c2b43c712c6264337fc16f340c9021fa17f45a02e888c19b4d2a244f970376720416bbbfb883e

  • SSDEEP

    12288:tubXcwafJcLln5QwnVWqqPIBONhxsU/E:turP90r/xsU/E

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ventoy-1.0.99\Ventoy2Disk.exe
    "C:\Users\Admin\AppData\Local\Temp\ventoy-1.0.99\Ventoy2Disk.exe"
    1⤵
    • Enumerates connected drives
    • Maps connected drives based on registry
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ventoy-1.0.99\log.txt

    Filesize

    2KB

    MD5

    8ba0bc750d004eb0f0976a537d0ed741

    SHA1

    60e4e2fb51838e663a0a68a66a0a431daff5944c

    SHA256

    d679a4c32ccb9dfc6188e203ff987ea7cbbfec02d1bf8fef19b10c9db0dc75a0

    SHA512

    68142f7396f59f16d0e02d202332a7329d17cf3af3311bda49ed87ff4038ad165b1bd0d7545cc4fac218e86c355059517f39115205bee7d30ade571e98166d22

  • C:\Users\Admin\AppData\Local\Temp\ventoy-1.0.99\log.txt

    Filesize

    1KB

    MD5

    8309470dcbb1db23723626db84d7b69c

    SHA1

    c8b541429463326e18c4993c258dfb7c408d953c

    SHA256

    994f4f18892b5b879bb6f6bf48de3db7e9110b540dc23e039f86fdaf2605f001

    SHA512

    90f6d079fd196b0c26aa178db248f951858f43b87a2bbbbe5518d210864a0c64b88a3c3cf792369b5500a2c71a8908d26e7fead58ed7796d62e8c1732cc24713