Analysis
-
max time kernel
207s -
max time network
279s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
25/02/2022, 21:00
Static task
static1
Behavioral task
behavioral1
Sample
hermeticwiper1.exe
Resource
win7-20220223-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
hermeticwiper1.exe
Resource
win10v2004-en-20220112
0 signatures
0 seconds
General
-
Target
hermeticwiper1.exe
-
Size
114KB
-
MD5
84ba0197920fd3e2b7dfa719fee09d2f
-
SHA1
912342f1c840a42f6b74132f8a7c4ffe7d40fb77
-
SHA256
0385eeab00e946a302b24a91dea4187c1210597b8e17cd9e2230450f5ece21da
-
SHA512
bbd4f0263abc71311404c55cb3e4711b707a71e28dcc1f08abd533a4c7f151db9cc40697105d76f1c978000e8fa7aa219adb65b31fb196b08f1ae003e04b9d23
Score
8/10
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\Drivers\xrdr hermeticwiper1.exe File created C:\Windows\system32\Drivers\xrdr.sys hermeticwiper1.exe File created C:\Windows\system32\Drivers\xrdr hermeticwiper1.exe -
Runs regedit.exe 1 IoCs
pid Process 3652 regedit.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3652 regedit.exe -
Suspicious behavior: LoadsDriver 5 IoCs
pid Process 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 0 1568 hermeticwiper1.exe Token: SeBackupPrivilege 1568 hermeticwiper1.exe Token: SeLoadDriverPrivilege 1568 hermeticwiper1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\hermeticwiper1.exe"C:\Users\Admin\AppData\Local\Temp\hermeticwiper1.exe"1⤵
- Drops file in Drivers directory
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wusvcs -p1⤵PID:1244
-
C:\Windows\regedit.exe"C:\Windows\regedit.exe"1⤵
- Runs regedit.exe
- Suspicious behavior: GetForegroundWindowSpam
PID:3652