Analysis
-
max time kernel
188s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 20:17
Static task
static1
Behavioral task
behavioral1
Sample
e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe
Resource
win10v2004-20220812-en
General
-
Target
e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe
-
Size
5.8MB
-
MD5
7cc45747bdc42b3ff4e395939af4dd63
-
SHA1
2b1868b7686f7122198d98b0426c2ae7daa68b80
-
SHA256
e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486
-
SHA512
01466dd373056f512140a470604d3aef9df50cad4e94d2947dc116346bc15946a51055b7b848bfb7ca0c553d48a34cb2043f6d71d71bbddbb0a916d6071e0fc4
-
SSDEEP
98304:Jk+5UUQ2ll0Zje8tNJj669cERHEkN+nCFwPoaSwIfeaG4u6V:d5UB2v088tUdkSCFwQe56V
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe File opened (read-only) \??\O: e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe File opened (read-only) \??\T: e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe File opened (read-only) \??\X: e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe File opened (read-only) \??\B: e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe File opened (read-only) \??\G: e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe File opened (read-only) \??\I: e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe File opened (read-only) \??\J: e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe File opened (read-only) \??\N: e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe File opened (read-only) \??\Z: e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe File opened (read-only) \??\M: e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe File opened (read-only) \??\R: e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe File opened (read-only) \??\E: e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe File opened (read-only) \??\F: e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe File opened (read-only) \??\H: e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe File opened (read-only) \??\K: e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe File opened (read-only) \??\L: e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe File opened (read-only) \??\W: e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe File opened (read-only) \??\Y: e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe File opened (read-only) \??\A: e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe File opened (read-only) \??\P: e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe File opened (read-only) \??\Q: e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe File opened (read-only) \??\U: e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe File opened (read-only) \??\V: e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3748 e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3748 e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe 3748 e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe"C:\Users\Admin\AppData\Local\Temp\e4548759ff33a0b03ac428d41b864ed3c7c707bb8990f6a7552b1244aa60a486.exe"1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3748