Analysis
-
max time kernel
100s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2022 08:24
Behavioral task
behavioral1
Sample
HermeticWiper.exe
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
HermeticWiper.exe
Resource
win10v2004-20220901-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
HermeticWiper.exe
-
Size
114KB
-
MD5
84ba0197920fd3e2b7dfa719fee09d2f
-
SHA1
912342f1c840a42f6b74132f8a7c4ffe7d40fb77
-
SHA256
0385eeab00e946a302b24a91dea4187c1210597b8e17cd9e2230450f5ece21da
-
SHA512
bbd4f0263abc71311404c55cb3e4711b707a71e28dcc1f08abd533a4c7f151db9cc40697105d76f1c978000e8fa7aa219adb65b31fb196b08f1ae003e04b9d23
-
SSDEEP
1536:lV3+WmNcWbwurilmw9BgjKu1sPPxaS5qY:lV3+WmjbwxlPwV1qPkS5qY
Score
8/10
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
Processes:
HermeticWiper.exedescription ioc process File created C:\Windows\system32\Drivers\pvdr.sys HermeticWiper.exe File created C:\Windows\system32\Drivers\pvdr HermeticWiper.exe File opened for modification C:\Windows\system32\Drivers\pvdr HermeticWiper.exe -
Suspicious behavior: LoadsDriver 5 IoCs
Processes:
pid process 656 656 656 656 656 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
HermeticWiper.exedescription pid process Token: 0 4868 HermeticWiper.exe Token: SeBackupPrivilege 4868 HermeticWiper.exe Token: SeLoadDriverPrivilege 4868 HermeticWiper.exe