Analysis

  • max time kernel
    143s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-11-2022 05:45

General

  • Target

    a930fdc73b8baf5340fe7118995ebbb1500811bc38630e8e06a21d607fd9d061.exe

  • Size

    403KB

  • MD5

    e3a5e238ce29c4c3a9ff1a1a90e41dbe

  • SHA1

    564696034315adb6b88323f1d45bb00eef202061

  • SHA256

    a930fdc73b8baf5340fe7118995ebbb1500811bc38630e8e06a21d607fd9d061

  • SHA512

    570ebeecf7cf7aba3a24a2502dd85124134b801ca97dbe422be1e38736c11cc973e371e1656b5b2501f59cd40deab296cf7dc1115c1b1b3be4026cfb89664b23

  • SSDEEP

    6144:NG7Xgof+fpMWV5Iis9cRuWJy07i41jhd+hDE/s/:g7Xnf+fbais9BSW4NhohDgs/

Malware Config

Signatures

  • Azov

    A wiper seeking only damage, first seen in 2022.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a930fdc73b8baf5340fe7118995ebbb1500811bc38630e8e06a21d607fd9d061.exe
    "C:\Users\Admin\AppData\Local\Temp\a930fdc73b8baf5340fe7118995ebbb1500811bc38630e8e06a21d607fd9d061.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    PID:1572

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1572-132-0x000002EB34CC0000-0x000002EB34CC4000-memory.dmp

    Filesize

    16KB

  • memory/1572-133-0x00007FF700110000-0x00007FF70016A000-memory.dmp

    Filesize

    360KB

  • memory/1572-135-0x000002EB34CA0000-0x000002EB34CA5000-memory.dmp

    Filesize

    20KB

  • memory/1572-134-0x000002EB34C80000-0x000002EB34C87000-memory.dmp

    Filesize

    28KB

  • memory/1572-136-0x000002EB34CC0000-0x000002EB34CC4000-memory.dmp

    Filesize

    16KB