Analysis
-
max time kernel
175s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 08:11
Static task
static1
Behavioral task
behavioral1
Sample
5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe
Resource
win10v2004-20221111-en
General
-
Target
5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe
-
Size
2.7MB
-
MD5
248b82461de5012a30670ded05f776a4
-
SHA1
f4dceae1dfd7c0cccdee8be8a0254074e9813c31
-
SHA256
5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9
-
SHA512
f606d9332900eca702c05c1085443f9196f7d676b7cc194a81650b669f17a00ae4e1c0950d9f7e9a8e03d818f15b7921bd41d983b3f08193802a466c720a508c
-
SSDEEP
49152:wEs8Iouv0Y6rJlFJ+O3/EWvuPlIcTvuPlIcC1HvuPlIc:48Ivv0Y0J+O8WvuPl3TvuPl3C1HvuPl3
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: 5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe File opened (read-only) \??\U: 5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe File opened (read-only) \??\B: 5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe File opened (read-only) \??\G: 5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe File opened (read-only) \??\K: 5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe File opened (read-only) \??\O: 5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe File opened (read-only) \??\Q: 5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe File opened (read-only) \??\R: 5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe File opened (read-only) \??\A: 5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe File opened (read-only) \??\E: 5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe File opened (read-only) \??\I: 5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe File opened (read-only) \??\L: 5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe File opened (read-only) \??\P: 5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe File opened (read-only) \??\H: 5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe File opened (read-only) \??\J: 5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe File opened (read-only) \??\V: 5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe File opened (read-only) \??\W: 5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe File opened (read-only) \??\Z: 5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe File opened (read-only) \??\Y: 5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe File opened (read-only) \??\F: 5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe File opened (read-only) \??\M: 5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe File opened (read-only) \??\N: 5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe File opened (read-only) \??\S: 5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe File opened (read-only) \??\X: 5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2304 5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe 2304 5ea996e2985ffcaaa724bceef51293bd28db854c95ffd1aab289454c78fbfde9.exe