Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 00:35
Static task
static1
Behavioral task
behavioral1
Sample
4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe
Resource
win10v2004-20220812-en
General
-
Target
4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe
-
Size
151KB
-
MD5
9301484ca00d16c2de6df6a1ee1220c0
-
SHA1
412ee67596a2a7f62988d56d946a3c644628fb86
-
SHA256
4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b
-
SHA512
a3d19e7093c29ff8e5de4248dca64a17e16f4be43b64b119e562aa8233e49f925d557062b205a6bccbba4aa031d8c7b66086aa62b0ed44a510e12ab00df558b8
-
SSDEEP
3072:lcNMVkd6KLhNy7kBFusBZJK79GrwNuWuB5i3YrXE:1VkwKL3fusBZsRGb/E
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\software\WOW6432Node\Microsoft\Windows\CurrentVersion\run 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe File opened (read-only) \??\R: 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe File opened (read-only) \??\K: 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe File opened (read-only) \??\I: 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe File opened (read-only) \??\H: 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe File opened (read-only) \??\G: 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe File opened (read-only) \??\X: 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe File opened (read-only) \??\L: 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe File opened (read-only) \??\Y: 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe File opened (read-only) \??\W: 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe File opened (read-only) \??\Q: 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe File opened (read-only) \??\P: 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe File opened (read-only) \??\N: 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe File opened (read-only) \??\M: 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe File opened (read-only) \??\J: 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe File opened (read-only) \??\Z: 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe File opened (read-only) \??\T: 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe File opened (read-only) \??\S: 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe File opened (read-only) \??\O: 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe File opened (read-only) \??\F: 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe File opened (read-only) \??\E: 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe File opened (read-only) \??\U: 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe File opened for modification C:\Documents and Settings\Admin\Local Settings\Application Data\Microsoft\CD Burning\autorun.inf 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1132 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe 1132 4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe"C:\Users\Admin\AppData\Local\Temp\4fa819e6a2bcb870afe97d0f82edf32e884b09b5c4cacf0d0d2f3aeea412477b.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Adds Run key to start application
- Enumerates connected drives
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
PID:1132