Analysis

  • max time kernel
    144s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    01-07-2022 02:20

General

  • Target

    files/Wiper.exe

  • Size

    114KB

  • MD5

    84ba0197920fd3e2b7dfa719fee09d2f

  • SHA1

    912342f1c840a42f6b74132f8a7c4ffe7d40fb77

  • SHA256

    0385eeab00e946a302b24a91dea4187c1210597b8e17cd9e2230450f5ece21da

  • SHA512

    bbd4f0263abc71311404c55cb3e4711b707a71e28dcc1f08abd533a4c7f151db9cc40697105d76f1c978000e8fa7aa219adb65b31fb196b08f1ae003e04b9d23

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 3 IoCs
  • Suspicious behavior: LoadsDriver 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\files\Wiper.exe
    "C:\Users\Admin\AppData\Local\Temp\files\Wiper.exe"
    1⤵
    • Drops file in Drivers directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1540

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads