Analysis

  • max time kernel
    140s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/08/2024, 00:07

General

  • Target

    836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe

  • Size

    184KB

  • MD5

    226ab9d3faac16759e05b8e5781089c2

  • SHA1

    47181cf51d919b59883793741484b3f4b5e73dd5

  • SHA256

    836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a

  • SHA512

    7e8078ecc94f6d169f692cf45e58a5baf8efc7520410f707fe9cc7cacb377c8d1759b308e1a17a87cb1568ffb3d9732e51013721fae7997e11c540daec298f47

  • SSDEEP

    3072:427mqUfrYZZ7JSUiSeG8uke3p3NlqVn2turIi/x37bWAC1/9iSBKLonj3:3yqUoZ7cUig8mJNl2Rr3Z3lAFNB9nb

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe
    "C:\Users\Admin\AppData\Local\Temp\836203b45f3b8a926f90cfbcd365f7188d3b64ed3deb6860a8b0a9e8a448687a.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops autorun.inf file
    • System Location Discovery: System Language Discovery
    PID:4588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • F:\ljigcfft.exe

    Filesize

    184KB

    MD5

    65d1e0508a33a7b6a3249537ef6b7859

    SHA1

    bcb9ebccddca462402b0b1b92e355ce86c49198a

    SHA256

    fc82ec6b2c3db9e4c8c446c95f91ea3ac65152b8d0f604c9c40de67540fe64e7

    SHA512

    2309d6288c617cfb363ed602449d967b37ad7c013499adb7411fc3522f728609067e42fae42f3f7b288f1113556ab56c797eff7f7141f50b6d5eaae306c0846c

  • memory/4588-0-0x00000000001D0000-0x00000000001E9000-memory.dmp

    Filesize

    100KB

  • memory/4588-7-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/4588-14-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/4588-22-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/4588-30-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/4588-37-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/4588-44-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/4588-50-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB