Analysis
-
max time kernel
69s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-04-2022 14:39
Static task
static1
Behavioral task
behavioral1
Sample
691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe
-
Size
6.6MB
-
MD5
98366e6b49a53c7deb39432a8435f157
-
SHA1
ea7c48a4b4d86c392d418b0d555d1b523ad808f6
-
SHA256
691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a
-
SHA512
a6f60b27647cceb56a410c0dde727f87b32a22b683a74461a464fe1bf1029023f8a1cc43c1a8adf976e7d390390e50c930cf756b59b7524456dc617f359defee
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4120-130-0x0000000002920000-0x000000000292C000-memory.dmp buer behavioral2/memory/4120-134-0x0000000040000000-0x0000000040009000-memory.dmp buer behavioral2/memory/4120-137-0x0000000002910000-0x0000000002919000-memory.dmp buer -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe File opened (read-only) \??\L: 691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe File opened (read-only) \??\N: 691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe File opened (read-only) \??\T: 691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe File opened (read-only) \??\Z: 691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe File opened (read-only) \??\E: 691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe File opened (read-only) \??\G: 691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe File opened (read-only) \??\H: 691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe File opened (read-only) \??\Q: 691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe File opened (read-only) \??\Y: 691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe File opened (read-only) \??\B: 691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe File opened (read-only) \??\F: 691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe File opened (read-only) \??\K: 691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe File opened (read-only) \??\U: 691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe File opened (read-only) \??\V: 691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe File opened (read-only) \??\W: 691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe File opened (read-only) \??\X: 691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe File opened (read-only) \??\O: 691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe File opened (read-only) \??\P: 691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe File opened (read-only) \??\S: 691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe File opened (read-only) \??\R: 691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe File opened (read-only) \??\A: 691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe File opened (read-only) \??\J: 691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe File opened (read-only) \??\M: 691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4120 691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe 4120 691474717b13721b4eb72bbc46d541e942b040e53a6dcfbd5523b17ec148051a.exe