Analysis Overview
SHA256
c7a7bd1b4c92ecd04a2cee933a616ed9cb567f82d8316bc8ce873a2ab8850d07
Threat Level: Known bad
The file c7a7bd1b4c92ecd04a2cee933a616ed9cb567f82d8316bc8ce873a2ab8850d07.exe was found to be: Known bad.
Malicious Activity Summary
Azov
Adds Run key to start application
Enumerates connected drives
Drops file in Program Files directory
MITRE ATT&CK Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-11-17 06:07
Signatures
Analysis: behavioral2
Detonation Overview
Submitted
2022-11-17 06:07
Reported
2022-11-17 06:09
Platform
win10v2004-20221111-en
Max time kernel
101s
Max time network
125s
Command Line
Signatures
Azov
Adds Run key to start application
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run | C:\Users\Admin\AppData\Local\Temp\c7a7bd1b4c92ecd04a2cee933a616ed9cb567f82d8316bc8ce873a2ab8850d07.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bandera = "C:\\ProgramData\\rdpclient.exe" | C:\Users\Admin\AppData\Local\Temp\c7a7bd1b4c92ecd04a2cee933a616ed9cb567f82d8316bc8ce873a2ab8850d07.exe | N/A |
Enumerates connected drives
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Program Files\7-Zip\7-zip.chm | C:\Users\Admin\AppData\Local\Temp\c7a7bd1b4c92ecd04a2cee933a616ed9cb567f82d8316bc8ce873a2ab8850d07.exe | N/A |
| File opened for modification | C:\Program Files\7-Zip\7z.exe | C:\Users\Admin\AppData\Local\Temp\c7a7bd1b4c92ecd04a2cee933a616ed9cb567f82d8316bc8ce873a2ab8850d07.exe | N/A |
| File created | C:\Program Files\7-Zip\RESTORE_FILES.txt | C:\Users\Admin\AppData\Local\Temp\c7a7bd1b4c92ecd04a2cee933a616ed9cb567f82d8316bc8ce873a2ab8850d07.exe | N/A |
| File opened for modification | C:\Program Files\7-Zip\7z.sfx | C:\Users\Admin\AppData\Local\Temp\c7a7bd1b4c92ecd04a2cee933a616ed9cb567f82d8316bc8ce873a2ab8850d07.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\c7a7bd1b4c92ecd04a2cee933a616ed9cb567f82d8316bc8ce873a2ab8850d07.exe
"C:\Users\Admin\AppData\Local\Temp\c7a7bd1b4c92ecd04a2cee933a616ed9cb567f82d8316bc8ce873a2ab8850d07.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 20.189.173.15:443 | tcp | |
| N/A | 178.79.208.1:80 | tcp | |
| N/A | 178.79.208.1:80 | tcp | |
| N/A | 178.79.208.1:80 | tcp | |
| N/A | 93.184.221.240:80 | tcp |
Files
memory/3492-133-0x00007FF6DBED0000-0x00007FF6DBF47000-memory.dmp
memory/3492-132-0x0000016950E90000-0x0000016950E94000-memory.dmp
memory/3492-134-0x0000016950E50000-0x0000016950E57000-memory.dmp
memory/3492-135-0x0000016950E70000-0x0000016950E75000-memory.dmp
memory/3492-136-0x0000016950E90000-0x0000016950E94000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2022-11-17 06:07
Reported
2022-11-17 06:07
Platform
win7-20220812-en
Max time kernel
0s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\c7a7bd1b4c92ecd04a2cee933a616ed9cb567f82d8316bc8ce873a2ab8850d07.exe
"C:\Users\Admin\AppData\Local\Temp\c7a7bd1b4c92ecd04a2cee933a616ed9cb567f82d8316bc8ce873a2ab8850d07.exe"