Analysis
-
max time kernel
61s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 10:23
Behavioral task
behavioral1
Sample
a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe
Resource
win7-20220901-en
General
-
Target
a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe
-
Size
98KB
-
MD5
a1c4b20644540a0cb2f9d99982c41eec
-
SHA1
4755af5bf6450663e84cf0c9a079bc927b402121
-
SHA256
a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461
-
SHA512
ae6bc656cf6b622235e96c6fad290dc50b15fb760c0492ca782366b5ca192726eaed18b3ca33f659b1f2f58a4d37de4d383f3d29a3577adacba07f294654e528
-
SSDEEP
1536:6gAHbj4YsoE33nSgxpe9HmNzpXPV3nouy82W0op1ZVQ:u7jA3Lpe9HGHoutf0opv+
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3068-132-0x0000000000400000-0x0000000000521000-memory.dmp upx behavioral2/memory/3068-138-0x0000000000400000-0x0000000000521000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe File opened (read-only) \??\Y: a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe File opened (read-only) \??\E: a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe File opened (read-only) \??\H: a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe File opened (read-only) \??\I: a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe File opened (read-only) \??\J: a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe File opened (read-only) \??\K: a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe File opened (read-only) \??\N: a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe File opened (read-only) \??\M: a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe File opened (read-only) \??\O: a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe File opened (read-only) \??\W: a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe File opened (read-only) \??\Z: a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe File opened (read-only) \??\B: a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe File opened (read-only) \??\F: a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe File opened (read-only) \??\P: a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe File opened (read-only) \??\Q: a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe File opened (read-only) \??\R: a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe File opened (read-only) \??\S: a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe File opened (read-only) \??\A: a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe File opened (read-only) \??\G: a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe File opened (read-only) \??\L: a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe File opened (read-only) \??\T: a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe File opened (read-only) \??\V: a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe File opened (read-only) \??\X: a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe -
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3068 a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe 3068 a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe 3068 a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe 3068 a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe 3068 a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe 3068 a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe 3068 a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe 3068 a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe 3068 a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe 3068 a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe 3068 a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe 3068 a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe 3068 a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe 3068 a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe 3068 a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe 3068 a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2172 3068 a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe 80 PID 3068 wrote to memory of 2172 3068 a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe 80 PID 3068 wrote to memory of 2172 3068 a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe"C:\Users\Admin\AppData\Local\Temp\a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe"1⤵
- Enumerates connected drives
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\\uninste56e3dd.bat" "C:\Users\Admin\AppData\Local\Temp\a2c8cab01ce3f6e416d427e5aaaa093f79cf5227ebb40378a87d053d56d26461.exe""2⤵PID:2172
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59B
MD52988b921fbed03f9c93c5d538932bbe3
SHA14b791b3d59ae76ff091c2cf201b40f5d1b432a3f
SHA256a1769979622d3d25829be12474ad32ccfdfcac59785dac2fc10ae49c300e4ea3
SHA5122920c6e9851973371dc238da1ee3c63d41c7820637856ee92c67e9489c1790e3fad287d229440d124e60b978f6819d04b47c40de9034cbd9de422aaafc2b07f9