Resubmissions

28-01-2023 12:31

230128-pp1hcagc4s 10

05-09-2022 08:24

220905-ka1scadgek 10

Analysis

  • max time kernel
    100s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-09-2022 08:24

General

  • Target

    HermeticWiper.exe

  • Size

    114KB

  • MD5

    84ba0197920fd3e2b7dfa719fee09d2f

  • SHA1

    912342f1c840a42f6b74132f8a7c4ffe7d40fb77

  • SHA256

    0385eeab00e946a302b24a91dea4187c1210597b8e17cd9e2230450f5ece21da

  • SHA512

    bbd4f0263abc71311404c55cb3e4711b707a71e28dcc1f08abd533a4c7f151db9cc40697105d76f1c978000e8fa7aa219adb65b31fb196b08f1ae003e04b9d23

  • SSDEEP

    1536:lV3+WmNcWbwurilmw9BgjKu1sPPxaS5qY:lV3+WmjbwxlPwV1qPkS5qY

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 3 IoCs
  • Suspicious behavior: LoadsDriver 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HermeticWiper.exe
    "C:\Users\Admin\AppData\Local\Temp\HermeticWiper.exe"
    1⤵
    • Drops file in Drivers directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4868

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads