Analysis
-
max time kernel
62s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-04-2022 14:39
Static task
static1
Behavioral task
behavioral1
Sample
9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe
-
Size
6.6MB
-
MD5
b18acf64909d55d9919fd796fc65a5f3
-
SHA1
2bbea10af479a63c39f2ffda1337042941375248
-
SHA256
9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7
-
SHA512
a24f39d9f6ee3d4f2e65f28da1446084cf8cda4df3bf6364d4da235c19c4601d60541f2bc665855346be7a920260dae5e550980f8521392b829184e534f2a8f4
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4292-130-0x0000000002A10000-0x0000000002A1C000-memory.dmp buer behavioral2/memory/4292-134-0x0000000040000000-0x0000000040009000-memory.dmp buer behavioral2/memory/4292-137-0x0000000002A00000-0x0000000002A09000-memory.dmp buer -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: 9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe File opened (read-only) \??\M: 9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe File opened (read-only) \??\N: 9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe File opened (read-only) \??\Q: 9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe File opened (read-only) \??\R: 9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe File opened (read-only) \??\W: 9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe File opened (read-only) \??\B: 9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe File opened (read-only) \??\I: 9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe File opened (read-only) \??\J: 9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe File opened (read-only) \??\K: 9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe File opened (read-only) \??\X: 9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe File opened (read-only) \??\E: 9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe File opened (read-only) \??\F: 9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe File opened (read-only) \??\L: 9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe File opened (read-only) \??\O: 9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe File opened (read-only) \??\U: 9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe File opened (read-only) \??\Z: 9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe File opened (read-only) \??\Y: 9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe File opened (read-only) \??\A: 9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe File opened (read-only) \??\H: 9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe File opened (read-only) \??\P: 9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe File opened (read-only) \??\S: 9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe File opened (read-only) \??\T: 9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe File opened (read-only) \??\V: 9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4292 9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe 4292 9678bf2faa844be6d7919e0f4dd9b31366d63dc9bc17c88642e33b6ab3b20ce7.exe