Malware Analysis Report

2024-09-23 07:05

Sample ID 220226-mfpndaadf7
Target 3c557727953a8f6b4788984464fb77741b821991acbf5e746aebdd02615b1767
SHA256 3c557727953a8f6b4788984464fb77741b821991acbf5e746aebdd02615b1767
Tags
wiper hermeticwiper
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

3c557727953a8f6b4788984464fb77741b821991acbf5e746aebdd02615b1767

Threat Level: Likely malicious

The file 3c557727953a8f6b4788984464fb77741b821991acbf5e746aebdd02615b1767 was found to be: Likely malicious.

Malicious Activity Summary

wiper hermeticwiper

Detect HermeticWiper

Hermeticwiper family

Drops file in Drivers directory

Suspicious behavior: LoadsDriver

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2022-03-17 15:29

Signatures

Detect HermeticWiper

wiper
Description Indicator Process Target
N/A N/A N/A N/A

Hermeticwiper family

hermeticwiper

Analysis: behavioral1

Detonation Overview

Submitted

2022-02-26 10:24

Reported

2022-02-26 10:27

Platform

win7-20220223-en

Max time kernel

4294178s

Max time network

119s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3c557727953a8f6b4788984464fb77741b821991acbf5e746aebdd02615b1767.exe"

Signatures

Drops file in Drivers directory

Description Indicator Process Target
File created C:\Windows\system32\Drivers\zddr C:\Users\Admin\AppData\Local\Temp\3c557727953a8f6b4788984464fb77741b821991acbf5e746aebdd02615b1767.exe N/A
File opened for modification C:\Windows\system32\Drivers\zddr C:\Users\Admin\AppData\Local\Temp\3c557727953a8f6b4788984464fb77741b821991acbf5e746aebdd02615b1767.exe N/A
File created C:\Windows\system32\Drivers\zddr.sys C:\Users\Admin\AppData\Local\Temp\3c557727953a8f6b4788984464fb77741b821991acbf5e746aebdd02615b1767.exe N/A

Suspicious behavior: LoadsDriver

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\3c557727953a8f6b4788984464fb77741b821991acbf5e746aebdd02615b1767.exe

"C:\Users\Admin\AppData\Local\Temp\3c557727953a8f6b4788984464fb77741b821991acbf5e746aebdd02615b1767.exe"

Network

N/A

Files

memory/964-54-0x0000000075131000-0x0000000075133000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-02-26 10:24

Reported

2022-02-26 10:27

Platform

win10v2004-en-20220112

Max time kernel

119s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\3c557727953a8f6b4788984464fb77741b821991acbf5e746aebdd02615b1767.exe"

Signatures

Drops file in Drivers directory

Description Indicator Process Target
File created C:\Windows\system32\Drivers\pvdr C:\Users\Admin\AppData\Local\Temp\3c557727953a8f6b4788984464fb77741b821991acbf5e746aebdd02615b1767.exe N/A
File opened for modification C:\Windows\system32\Drivers\pvdr C:\Users\Admin\AppData\Local\Temp\3c557727953a8f6b4788984464fb77741b821991acbf5e746aebdd02615b1767.exe N/A
File created C:\Windows\system32\Drivers\pvdr.sys C:\Users\Admin\AppData\Local\Temp\3c557727953a8f6b4788984464fb77741b821991acbf5e746aebdd02615b1767.exe N/A

Suspicious behavior: LoadsDriver

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\3c557727953a8f6b4788984464fb77741b821991acbf5e746aebdd02615b1767.exe

"C:\Users\Admin\AppData\Local\Temp\3c557727953a8f6b4788984464fb77741b821991acbf5e746aebdd02615b1767.exe"

Network

Country Destination Domain Proto
NL 92.123.77.56:80 tcp
US 209.197.3.8:80 tcp
NL 92.123.77.56:80 tcp
US 93.184.220.29:80 tcp
US 8.8.8.8:53 geo.prod.do.dsp.mp.microsoft.com udp
IE 20.54.24.79:443 geo.prod.do.dsp.mp.microsoft.com tcp
US 8.8.8.8:53 kv801.prod.do.dsp.mp.microsoft.com udp
NL 184.29.205.60:443 kv801.prod.do.dsp.mp.microsoft.com tcp
US 8.8.8.8:53 cp801.prod.do.dsp.mp.microsoft.com udp
NL 184.29.205.60:443 cp801.prod.do.dsp.mp.microsoft.com tcp
NL 184.29.205.60:443 cp801.prod.do.dsp.mp.microsoft.com tcp

Files

N/A