Analysis Overview
SHA256
16ee5eb9bd028bf3665884b78a6d5eb595aa05d32eacd345d01bf337f4b602f5
Threat Level: Known bad
The file 16ee5eb9bd028bf3665884b78a6d5eb595aa05d32eacd345d01bf337f4b602f5 was found to be: Known bad.
Malicious Activity Summary
Azov
Adds Run key to start application
Enumerates connected drives
Drops file in Program Files directory
MITRE ATT&CK Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-11-16 05:03
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-11-16 05:03
Reported
2022-11-16 05:05
Platform
win7-20221111-en
Max time kernel
30s
Max time network
33s
Command Line
Signatures
Azov
Adds Run key to start application
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run | C:\Users\Admin\AppData\Local\Temp\16ee5eb9bd028bf3665884b78a6d5eb595aa05d32eacd345d01bf337f4b602f5.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bandera = "C:\\ProgramData\\rdpclient.exe" | C:\Users\Admin\AppData\Local\Temp\16ee5eb9bd028bf3665884b78a6d5eb595aa05d32eacd345d01bf337f4b602f5.exe | N/A |
Enumerates connected drives
Drops file in Program Files directory
Processes
C:\Users\Admin\AppData\Local\Temp\16ee5eb9bd028bf3665884b78a6d5eb595aa05d32eacd345d01bf337f4b602f5.exe
"C:\Users\Admin\AppData\Local\Temp\16ee5eb9bd028bf3665884b78a6d5eb595aa05d32eacd345d01bf337f4b602f5.exe"
Network
Files
memory/1080-55-0x00000000FF9C0000-0x00000000FF9E4000-memory.dmp
memory/1080-54-0x0000000000110000-0x0000000000114000-memory.dmp
memory/1080-56-0x000007FEFC211000-0x000007FEFC213000-memory.dmp
memory/1080-59-0x0000000000110000-0x0000000000114000-memory.dmp
memory/1080-58-0x0000000000100000-0x0000000000105000-memory.dmp
memory/1080-57-0x00000000000E0000-0x00000000000E6000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2022-11-16 05:03
Reported
2022-11-16 05:05
Platform
win10v2004-20221111-en
Max time kernel
143s
Max time network
148s
Command Line
Signatures
Azov
Adds Run key to start application
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run | C:\Users\Admin\AppData\Local\Temp\16ee5eb9bd028bf3665884b78a6d5eb595aa05d32eacd345d01bf337f4b602f5.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bandera = "C:\\ProgramData\\rdpclient.exe" | C:\Users\Admin\AppData\Local\Temp\16ee5eb9bd028bf3665884b78a6d5eb595aa05d32eacd345d01bf337f4b602f5.exe | N/A |
Enumerates connected drives
Drops file in Program Files directory
Processes
C:\Users\Admin\AppData\Local\Temp\16ee5eb9bd028bf3665884b78a6d5eb595aa05d32eacd345d01bf337f4b602f5.exe
"C:\Users\Admin\AppData\Local\Temp\16ee5eb9bd028bf3665884b78a6d5eb595aa05d32eacd345d01bf337f4b602f5.exe"
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
Network
| Country | Destination | Domain | Proto |
| N/A | 67.26.109.254:80 | tcp | |
| N/A | 67.26.109.254:80 | tcp | |
| N/A | 72.21.91.29:80 | tcp | |
| N/A | 104.80.225.205:443 | tcp | |
| N/A | 20.50.80.209:443 | tcp | |
| N/A | 67.26.109.254:80 | tcp | |
| N/A | 67.26.109.254:80 | tcp | |
| N/A | 67.26.109.254:80 | tcp |
Files
memory/3408-132-0x0000000000820000-0x0000000000824000-memory.dmp
memory/3408-133-0x00007FF7038F0000-0x00007FF703914000-memory.dmp
memory/3408-136-0x0000000000820000-0x0000000000824000-memory.dmp
memory/3408-135-0x0000000000810000-0x0000000000815000-memory.dmp
memory/3408-134-0x00000000007F0000-0x00000000007F6000-memory.dmp