Analysis
-
max time kernel
1760s -
max time network
1768s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
07-03-2021 19:52
Static task
static1
Behavioral task
behavioral1
Sample
a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe
-
Size
24KB
-
MD5
b0ddc235e52fb1c8c174c0624643c647
-
SHA1
41cc34a4a36aba8709a48e7cd302e23e901d6495
-
SHA256
a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e
-
SHA512
da0cd1d6fe1bb0c1d3b5dde9fb07698a1ccc45b9a093bc2a34155fa1c80886944f8d82f7006521738bb30d638da518e8ed0fe895f13eb81b65556accf9875873
Score
6/10
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe File opened (read-only) \??\Q: a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe File opened (read-only) \??\Y: a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe File opened (read-only) \??\A: a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe File opened (read-only) \??\E: a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe File opened (read-only) \??\F: a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe File opened (read-only) \??\H: a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe File opened (read-only) \??\J: a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe File opened (read-only) \??\K: a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe File opened (read-only) \??\L: a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe File opened (read-only) \??\N: a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe File opened (read-only) \??\S: a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe File opened (read-only) \??\G: a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe File opened (read-only) \??\P: a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe File opened (read-only) \??\U: a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe File opened (read-only) \??\W: a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe File opened (read-only) \??\Z: a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe File opened (read-only) \??\I: a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe File opened (read-only) \??\M: a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe File opened (read-only) \??\O: a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe File opened (read-only) \??\R: a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe File opened (read-only) \??\T: a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe File opened (read-only) \??\V: a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe File opened (read-only) \??\X: a707661d26bcaa73c2986d1e528ef65e33aba875afa729b90b1aae00e457654e.exe