Analysis Overview
SHA256
996e9a259a5380131d934b2d32a3a7853844ed80a762289d5bd493b4f43e555d
Threat Level: Known bad
The file 996e9a259a5380131d934b2d32a3a7853844ed80a762289d5bd493b4f43e555d.exe was found to be: Known bad.
Malicious Activity Summary
Azov
Adds Run key to start application
Enumerates connected drives
Drops file in Program Files directory
MITRE ATT&CK Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-11-17 06:03
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-11-17 06:03
Reported
2022-11-17 06:03
Platform
win7-20221111-en
Max time kernel
0s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\996e9a259a5380131d934b2d32a3a7853844ed80a762289d5bd493b4f43e555d.exe
"C:\Users\Admin\AppData\Local\Temp\996e9a259a5380131d934b2d32a3a7853844ed80a762289d5bd493b4f43e555d.exe"
Network
Files
Analysis: behavioral2
Detonation Overview
Submitted
2022-11-17 06:03
Reported
2022-11-17 06:05
Platform
win10v2004-20220812-en
Max time kernel
88s
Max time network
141s
Command Line
Signatures
Azov
Adds Run key to start application
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run | C:\Users\Admin\AppData\Local\Temp\996e9a259a5380131d934b2d32a3a7853844ed80a762289d5bd493b4f43e555d.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bandera = "C:\\ProgramData\\rdpclient.exe" | C:\Users\Admin\AppData\Local\Temp\996e9a259a5380131d934b2d32a3a7853844ed80a762289d5bd493b4f43e555d.exe | N/A |
Enumerates connected drives
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Program Files\7-Zip\7-zip.chm | C:\Users\Admin\AppData\Local\Temp\996e9a259a5380131d934b2d32a3a7853844ed80a762289d5bd493b4f43e555d.exe | N/A |
| File opened for modification | C:\Program Files\7-Zip\7z.exe | C:\Users\Admin\AppData\Local\Temp\996e9a259a5380131d934b2d32a3a7853844ed80a762289d5bd493b4f43e555d.exe | N/A |
| File created | C:\Program Files\7-Zip\RESTORE_FILES.txt | C:\Users\Admin\AppData\Local\Temp\996e9a259a5380131d934b2d32a3a7853844ed80a762289d5bd493b4f43e555d.exe | N/A |
| File opened for modification | C:\Program Files\7-Zip\7z.sfx | C:\Users\Admin\AppData\Local\Temp\996e9a259a5380131d934b2d32a3a7853844ed80a762289d5bd493b4f43e555d.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\996e9a259a5380131d934b2d32a3a7853844ed80a762289d5bd493b4f43e555d.exe
"C:\Users\Admin\AppData\Local\Temp\996e9a259a5380131d934b2d32a3a7853844ed80a762289d5bd493b4f43e555d.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 40.79.141.153:443 | tcp | |
| N/A | 93.184.221.240:80 | tcp | |
| N/A | 93.184.220.29:80 | tcp |
Files
memory/4348-132-0x0000024CACC20000-0x0000024CACC24000-memory.dmp
memory/4348-133-0x00007FF659140000-0x00007FF6591B7000-memory.dmp
memory/4348-135-0x0000024CACC00000-0x0000024CACC05000-memory.dmp
memory/4348-136-0x0000024CACC20000-0x0000024CACC24000-memory.dmp
memory/4348-134-0x0000024CACBE0000-0x0000024CACBE7000-memory.dmp