Analysis
-
max time kernel
63s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-04-2022 14:40
Static task
static1
Behavioral task
behavioral1
Sample
19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe
-
Size
6.6MB
-
MD5
037d4104c1e24c0bb8372981fa8db345
-
SHA1
71ade2a6e235d97283961cec0902a5c2836b2a22
-
SHA256
19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b
-
SHA512
64382367232993f9f221ae91b18722c6a4aeae7720cc9e07e3d76be001b3222c7e57b6153e27bcbf3ae8b63e00367844f10805fc999e734bb0ee0caa94679a7a
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4644-130-0x00000000029C0000-0x00000000029CC000-memory.dmp buer behavioral2/memory/4644-134-0x0000000040000000-0x0000000040009000-memory.dmp buer behavioral2/memory/4644-137-0x00000000030E0000-0x00000000030E9000-memory.dmp buer -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: 19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe File opened (read-only) \??\G: 19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe File opened (read-only) \??\L: 19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe File opened (read-only) \??\N: 19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe File opened (read-only) \??\Q: 19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe File opened (read-only) \??\R: 19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe File opened (read-only) \??\S: 19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe File opened (read-only) \??\U: 19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe File opened (read-only) \??\W: 19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe File opened (read-only) \??\A: 19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe File opened (read-only) \??\J: 19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe File opened (read-only) \??\T: 19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe File opened (read-only) \??\Y: 19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe File opened (read-only) \??\I: 19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe File opened (read-only) \??\M: 19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe File opened (read-only) \??\F: 19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe File opened (read-only) \??\H: 19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe File opened (read-only) \??\K: 19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe File opened (read-only) \??\O: 19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe File opened (read-only) \??\P: 19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe File opened (read-only) \??\V: 19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe File opened (read-only) \??\B: 19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe File opened (read-only) \??\E: 19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe File opened (read-only) \??\X: 19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4644 19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe 4644 19f68a2c0567aa9d47fc9ca69fc0a2192413f38142b61911a8999ce6c4c16e5b.exe