Analysis Overview
SHA256
4a29756b890feadbb8506662bb02da34f264ffcce40b05a0e44378b01ce2cd24
Threat Level: Known bad
The file 4a29756b890feadbb8506662bb02da34f264ffcce40b05a0e44378b01ce2cd24.exe was found to be: Known bad.
Malicious Activity Summary
Azov
Reads user/profile data of web browsers
Adds Run key to start application
Enumerates connected drives
Drops file in Program Files directory
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-11-13 05:01
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-11-13 05:01
Reported
2022-11-13 05:03
Platform
win7-20220812-en
Max time kernel
42s
Max time network
45s
Command Line
Signatures
Azov
Reads user/profile data of web browsers
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bandera = "C:\\ProgramData\\rdpclient.exe" | C:\Users\Admin\AppData\Local\Temp\4a29756b890feadbb8506662bb02da34f264ffcce40b05a0e44378b01ce2cd24.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run | C:\Users\Admin\AppData\Local\Temp\4a29756b890feadbb8506662bb02da34f264ffcce40b05a0e44378b01ce2cd24.exe | N/A |
Enumerates connected drives
Drops file in Program Files directory
Processes
C:\Users\Admin\AppData\Local\Temp\4a29756b890feadbb8506662bb02da34f264ffcce40b05a0e44378b01ce2cd24.exe
"C:\Users\Admin\AppData\Local\Temp\4a29756b890feadbb8506662bb02da34f264ffcce40b05a0e44378b01ce2cd24.exe"
Network
Files
memory/1112-54-0x0000000000190000-0x0000000000194000-memory.dmp
memory/1112-55-0x00000000FF390000-0x00000000FF3B4000-memory.dmp
memory/1112-56-0x000007FEFB801000-0x000007FEFB803000-memory.dmp
memory/1112-57-0x0000000000160000-0x0000000000167000-memory.dmp
memory/1112-58-0x0000000000180000-0x0000000000185000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2022-11-13 05:01
Reported
2022-11-13 05:03
Platform
win10v2004-20220812-en
Max time kernel
131s
Max time network
149s
Command Line
Signatures
Azov
Adds Run key to start application
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run | C:\Users\Admin\AppData\Local\Temp\4a29756b890feadbb8506662bb02da34f264ffcce40b05a0e44378b01ce2cd24.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bandera = "C:\\ProgramData\\rdpclient.exe" | C:\Users\Admin\AppData\Local\Temp\4a29756b890feadbb8506662bb02da34f264ffcce40b05a0e44378b01ce2cd24.exe | N/A |
Enumerates connected drives
Drops file in Program Files directory
Processes
C:\Users\Admin\AppData\Local\Temp\4a29756b890feadbb8506662bb02da34f264ffcce40b05a0e44378b01ce2cd24.exe
"C:\Users\Admin\AppData\Local\Temp\4a29756b890feadbb8506662bb02da34f264ffcce40b05a0e44378b01ce2cd24.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 93.184.221.240:80 | tcp | |
| N/A | 93.184.221.240:80 | tcp | |
| N/A | 52.168.117.170:443 | tcp | |
| N/A | 93.184.221.240:80 | tcp |
Files
memory/4664-132-0x0000000000F00000-0x0000000000F04000-memory.dmp
memory/4664-133-0x00007FF7E5030000-0x00007FF7E5054000-memory.dmp
memory/4664-134-0x0000000000ED0000-0x0000000000ED7000-memory.dmp
memory/4664-135-0x0000000000EF0000-0x0000000000EF5000-memory.dmp
memory/4664-136-0x0000000000F00000-0x0000000000F04000-memory.dmp