Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-08-2024 01:48

General

  • Target

    resources/app/iot_driver.exe

  • Size

    6.7MB

  • MD5

    1ade1bea51eb0715af8d28a769e7a0c9

  • SHA1

    be3d40c7cd5295a46dc393881287f95bc8c38ada

  • SHA256

    7d05c01c41425a83d0c7d25dd991cbd8e1f865d51d04da53697a77afc4342227

  • SHA512

    20672ed84da1a63f323cf72275a836eb3ba51c260d2a6e7f6a7ef5c7a599771b681823e056354dfed769fe4029a1732db76f368b23244362ba077f8f096c1b90

  • SSDEEP

    196608:NkdMXoM/uEseXc93gOsP+abX6q0/qQ0aU/x6XfFEv0fEDHnWGfjRVLF4ckEN6hHq:NkdMXoM/uEseXc93gOsP+abX6q0/qQ0f

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\resources\app\iot_driver.exe
    "C:\Users\Admin\AppData\Local\Temp\resources\app\iot_driver.exe"
    1⤵
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:3076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads