Analysis
-
max time kernel
526s -
max time network
514s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2022 05:44
Static task
static1
Behavioral task
behavioral1
Sample
dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe
Resource
win10v2004-20220812-en
General
-
Target
dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe
-
Size
189KB
-
MD5
c8440437385f5d0018a1b47af689d948
-
SHA1
88ccafc5f1b5d31e6886f34e1176253267ac80d4
-
SHA256
dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91
-
SHA512
86832d9cb60792575166dd64582b44d1758f1433b7de09ecae40b66d923a3cb5220604eab44fee460485bdd10a8922b737c998a5c99cfff17e8683bddcd978a8
-
SSDEEP
3072:RplB7e7MRzRTrPU39BLGiKMll6rmsH5LIJIp+f5CC3CvcZtsSp:DlB7e7WzR/Ps9pK4l6rmoOIp+xWcZtpp
Malware Config
Signatures
-
Azov
A wiper seeking only damage, first seen in 2022.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bandera = "C:\\ProgramData\\rdpclient.exe" dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exedescription ioc process File opened (read-only) \??\J: dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe File opened (read-only) \??\U: dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe File opened (read-only) \??\Z: dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe File opened (read-only) \??\K: dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe File opened (read-only) \??\L: dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe File opened (read-only) \??\P: dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe File opened (read-only) \??\S: dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe File opened (read-only) \??\A: dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe File opened (read-only) \??\E: dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe File opened (read-only) \??\F: dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe File opened (read-only) \??\H: dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe File opened (read-only) \??\T: dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe File opened (read-only) \??\X: dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe File opened (read-only) \??\Y: dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe File opened (read-only) \??\V: dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe File opened (read-only) \??\M: dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe File opened (read-only) \??\N: dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe File opened (read-only) \??\O: dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe File opened (read-only) \??\R: dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe File opened (read-only) \??\W: dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe File opened (read-only) \??\B: dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe File opened (read-only) \??\G: dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe File opened (read-only) \??\I: dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe File opened (read-only) \??\Q: dc659d0624712f8331b4240509896a60eb6277bc26ebf041573de9039610aa91.exe