Analysis
-
max time kernel
92s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-04-2022 14:39
Static task
static1
Behavioral task
behavioral1
Sample
9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe
-
Size
6.6MB
-
MD5
c48fda7e84beb1a767122453558de272
-
SHA1
063d8217a32d1e6491ed94abcd6ffafd15808bc2
-
SHA256
9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464
-
SHA512
1cf5a50fce028bcc0b4baa5f79b7e6785573ea7b2049b40c4962da3a785f28398f5ae2883f42b332cc2f6e4390a2ccbee2106b29c5f771a9f72e4d0bb7bcdc93
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2916-130-0x0000000003100000-0x000000000310C000-memory.dmp buer behavioral2/memory/2916-134-0x0000000040000000-0x0000000040009000-memory.dmp buer behavioral2/memory/2916-137-0x0000000002A10000-0x0000000002A19000-memory.dmp buer -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\F: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\H: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\S: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\T: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\Z: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\A: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\G: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\I: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\L: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\M: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\N: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\P: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\Q: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\U: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\J: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\K: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\O: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\R: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\W: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\Y: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\E: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\V: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe File opened (read-only) \??\X: 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2916 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe 2916 9609f76c0d687ac6eae37ff4765c944cf9354eb03ea7afbd537f9871f6fd4464.exe