Analysis
-
max time kernel
4294421s -
max time network
363s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
25/02/2022, 21:00
Static task
static1
Behavioral task
behavioral1
Sample
hermeticwiper1.exe
Resource
win7-20220223-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
hermeticwiper1.exe
Resource
win10v2004-en-20220112
0 signatures
0 seconds
General
-
Target
hermeticwiper1.exe
-
Size
114KB
-
MD5
84ba0197920fd3e2b7dfa719fee09d2f
-
SHA1
912342f1c840a42f6b74132f8a7c4ffe7d40fb77
-
SHA256
0385eeab00e946a302b24a91dea4187c1210597b8e17cd9e2230450f5ece21da
-
SHA512
bbd4f0263abc71311404c55cb3e4711b707a71e28dcc1f08abd533a4c7f151db9cc40697105d76f1c978000e8fa7aa219adb65b31fb196b08f1ae003e04b9d23
Score
8/10
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\system32\Drivers\dbdr hermeticwiper1.exe File opened for modification C:\Windows\system32\Drivers\dbdr hermeticwiper1.exe File created C:\Windows\system32\Drivers\dbdr.sys hermeticwiper1.exe -
Runs regedit.exe 1 IoCs
pid Process 1140 regedit.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1140 regedit.exe -
Suspicious behavior: LoadsDriver 5 IoCs
pid Process 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 0 1992 hermeticwiper1.exe Token: SeBackupPrivilege 1992 hermeticwiper1.exe Token: SeLoadDriverPrivilege 1992 hermeticwiper1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\hermeticwiper1.exe"C:\Users\Admin\AppData\Local\Temp\hermeticwiper1.exe"1⤵
- Drops file in Drivers directory
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
C:\Windows\regedit.exe"C:\Windows\regedit.exe"1⤵
- Runs regedit.exe
- Suspicious behavior: GetForegroundWindowSpam
PID:1140