Analysis
-
max time kernel
97s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-04-2022 14:41
Static task
static1
Behavioral task
behavioral1
Sample
06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe
-
Size
6.6MB
-
MD5
d9731775fe3eaebd566cc726e6e317c0
-
SHA1
a65d81edadbd26c5c08c1ed77b90fbebeae02056
-
SHA256
06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746
-
SHA512
a247d78ef198e86821a956997e296de73a0acc93ca2d7be3007bf9a22a700e2920c89834d63a71286e1a02f048009ce20a2555a36048256a6be8886006c61f9b
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4192-130-0x0000000002A10000-0x0000000002A1C000-memory.dmp buer behavioral2/memory/4192-134-0x0000000040000000-0x0000000040009000-memory.dmp buer behavioral2/memory/4192-137-0x0000000002A00000-0x0000000002A09000-memory.dmp buer -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: 06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe File opened (read-only) \??\Z: 06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe File opened (read-only) \??\A: 06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe File opened (read-only) \??\J: 06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe File opened (read-only) \??\L: 06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe File opened (read-only) \??\O: 06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe File opened (read-only) \??\T: 06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe File opened (read-only) \??\V: 06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe File opened (read-only) \??\W: 06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe File opened (read-only) \??\I: 06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe File opened (read-only) \??\B: 06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe File opened (read-only) \??\E: 06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe File opened (read-only) \??\G: 06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe File opened (read-only) \??\H: 06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe File opened (read-only) \??\P: 06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe File opened (read-only) \??\Q: 06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe File opened (read-only) \??\R: 06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe File opened (read-only) \??\S: 06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe File opened (read-only) \??\F: 06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe File opened (read-only) \??\K: 06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe File opened (read-only) \??\M: 06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe File opened (read-only) \??\N: 06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe File opened (read-only) \??\U: 06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe File opened (read-only) \??\Y: 06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4192 06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe 4192 06a71ef34edd21f127e0e5f64d5e8d8e17d79b306bbe29df71a1a6ceeae78746.exe