Analysis
-
max time kernel
18s -
max time network
7s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 03:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Temp.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
Temp.exe
-
Size
688KB
-
MD5
975435a873d5ec63f5f5ad74e0d563b2
-
SHA1
3f2a71392719c488d91c454d4b55da641567bd1c
-
SHA256
2549f3a370a087065e1ccdfd09c49b2e10e6fc2631945d7b9fae749b415b382f
-
SHA512
4005623aea46a43c312ab847f34aa64ea0be60824ee7885e8da02f99ccedba057a6a6bcb9a32ce2cf38690def04bf4cb1cfe9550f13db8f9c35730e0996de4a9
-
SSDEEP
12288:Ufbgm+7ACAFoGHQBvK0BhpgPkm/vqGbHy79jW:Uf8vECwoQd0BhpgB6GW79j
Score
6/10
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: Temp.exe File opened (read-only) \??\B: Temp.exe File opened (read-only) \??\A: Temp.exe File opened (read-only) \??\B: Temp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Temp.exe"C:\Users\Admin\AppData\Local\Temp\Temp.exe"1⤵
- Enumerates connected drives
PID:868
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1324
-
C:\Users\Admin\Desktop\Temp.exe"C:\Users\Admin\Desktop\Temp.exe"1⤵
- Enumerates connected drives
PID:1964