Analysis Overview
SHA256
cfe9b79faf455e5ba96d1949d24af3bc4ea4671ade277df1a9674ab538c62c9d
Threat Level: Known bad
The file cfe9b79faf455e5ba96d1949d24af3bc4ea4671ade277df1a9674ab538c62c9d was found to be: Known bad.
Malicious Activity Summary
Azov
Reads user/profile data of web browsers
Adds Run key to start application
Enumerates connected drives
Drops file in Program Files directory
MITRE ATT&CK Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-11-17 06:46
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-11-17 06:46
Reported
2022-11-17 06:48
Platform
win7-20221111-en
Max time kernel
30s
Max time network
33s
Command Line
Signatures
Azov
Reads user/profile data of web browsers
Adds Run key to start application
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run | C:\Users\Admin\AppData\Local\Temp\cfe9b79faf455e5ba96d1949d24af3bc4ea4671ade277df1a9674ab538c62c9d.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bandera = "C:\\ProgramData\\rdpclient.exe" | C:\Users\Admin\AppData\Local\Temp\cfe9b79faf455e5ba96d1949d24af3bc4ea4671ade277df1a9674ab538c62c9d.exe | N/A |
Enumerates connected drives
Drops file in Program Files directory
Processes
C:\Users\Admin\AppData\Local\Temp\cfe9b79faf455e5ba96d1949d24af3bc4ea4671ade277df1a9674ab538c62c9d.exe
"C:\Users\Admin\AppData\Local\Temp\cfe9b79faf455e5ba96d1949d24af3bc4ea4671ade277df1a9674ab538c62c9d.exe"
Network
Files
memory/2036-54-0x0000000000110000-0x0000000000114000-memory.dmp
memory/2036-55-0x000000013F430000-0x000000013F446000-memory.dmp
memory/2036-56-0x000007FEFC211000-0x000007FEFC213000-memory.dmp
memory/2036-57-0x00000000000E0000-0x00000000000E7000-memory.dmp
memory/2036-58-0x0000000000100000-0x0000000000105000-memory.dmp
memory/2036-59-0x0000000000110000-0x0000000000114000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2022-11-17 06:46
Reported
2022-11-17 06:48
Platform
win10v2004-20220812-en
Max time kernel
146s
Max time network
152s
Command Line
Signatures
Azov
Adds Run key to start application
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run | C:\Users\Admin\AppData\Local\Temp\cfe9b79faf455e5ba96d1949d24af3bc4ea4671ade277df1a9674ab538c62c9d.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bandera = "C:\\ProgramData\\rdpclient.exe" | C:\Users\Admin\AppData\Local\Temp\cfe9b79faf455e5ba96d1949d24af3bc4ea4671ade277df1a9674ab538c62c9d.exe | N/A |
Enumerates connected drives
Drops file in Program Files directory
Processes
C:\Users\Admin\AppData\Local\Temp\cfe9b79faf455e5ba96d1949d24af3bc4ea4671ade277df1a9674ab538c62c9d.exe
"C:\Users\Admin\AppData\Local\Temp\cfe9b79faf455e5ba96d1949d24af3bc4ea4671ade277df1a9674ab538c62c9d.exe"
Network
| Country | Destination | Domain | Proto |
| N/A | 93.184.221.240:80 | tcp | |
| N/A | 20.52.64.200:443 | tcp |
Files
memory/4612-132-0x0000029E14A30000-0x0000029E14A34000-memory.dmp
memory/4612-133-0x00007FF7CE620000-0x00007FF7CE636000-memory.dmp
memory/4612-136-0x0000029E14A30000-0x0000029E14A34000-memory.dmp
memory/4612-135-0x0000029E14A20000-0x0000029E14A25000-memory.dmp
memory/4612-134-0x0000029E14A00000-0x0000029E14A07000-memory.dmp