Analysis
-
max time kernel
40s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
17-04-2022 14:39
Static task
static1
Behavioral task
behavioral1
Sample
9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe
-
Size
6.6MB
-
MD5
c48fda7e84beb1a767122453558de272
-
SHA1
063d8217a32d1e6491ed94abcd6ffafd15808bc2
-
SHA256
9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464
-
SHA512
1cf5a50fce028bcc0b4baa5f79b7e6785573ea7b2049b40c4962da3a785f28398f5ae2883f42b332cc2f6e4390a2ccbee2106b29c5f771a9f72e4d0bb7bcdc93
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1652-59-0x0000000040000000-0x0000000040009000-memory.dmp buer behavioral1/memory/1652-55-0x0000000002480000-0x000000000248C000-memory.dmp buer behavioral1/memory/1652-62-0x0000000002430000-0x0000000002439000-memory.dmp buer -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\O: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\R: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\T: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\A: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\G: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\H: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\M: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\V: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\Y: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\P: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\Q: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\S: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\U: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\B: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\E: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\K: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\L: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\X: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\Z: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\F: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\I: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\J: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\W: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1652 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe 1652 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe