Analysis Overview
SHA256
cfe9b79faf455e5ba96d1949d24af3bc4ea4671ade277df1a9674ab538c62c9d
Threat Level: Known bad
The file cfe9b79faf455e5ba96d1949d24af3bc4ea4671ade277df1a9674ab538c62c9d.exe was found to be: Known bad.
Malicious Activity Summary
Azov
Adds Run key to start application
Enumerates connected drives
Drops file in Program Files directory
MITRE ATT&CK Matrix V6
Analysis: static1
Detonation Overview
Reported
2023-01-15 13:48
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2023-01-15 13:48
Reported
2023-01-15 13:51
Platform
win7-20220901-en
Max time kernel
47s
Max time network
51s
Command Line
Signatures
Azov
Adds Run key to start application
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run | C:\Users\Admin\AppData\Local\Temp\cfe9b79faf455e5ba96d1949d24af3bc4ea4671ade277df1a9674ab538c62c9d.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bandera = "C:\\ProgramData\\rdpclient.exe" | C:\Users\Admin\AppData\Local\Temp\cfe9b79faf455e5ba96d1949d24af3bc4ea4671ade277df1a9674ab538c62c9d.exe | N/A |
Enumerates connected drives
Drops file in Program Files directory
Processes
C:\Users\Admin\AppData\Local\Temp\cfe9b79faf455e5ba96d1949d24af3bc4ea4671ade277df1a9674ab538c62c9d.exe
"C:\Users\Admin\AppData\Local\Temp\cfe9b79faf455e5ba96d1949d24af3bc4ea4671ade277df1a9674ab538c62c9d.exe"
Network
Files
memory/1356-54-0x0000000000110000-0x0000000000114000-memory.dmp
memory/1356-55-0x000000013FA40000-0x000000013FA56000-memory.dmp
memory/1356-56-0x000007FEFB651000-0x000007FEFB653000-memory.dmp
memory/1356-59-0x0000000000110000-0x0000000000114000-memory.dmp
memory/1356-58-0x0000000000100000-0x0000000000105000-memory.dmp
memory/1356-57-0x00000000000E0000-0x00000000000E7000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2023-01-15 13:48
Reported
2023-01-15 13:51
Platform
win10v2004-20220812-en
Max time kernel
8s
Max time network
2s
Command Line
Signatures
Azov
Adds Run key to start application
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run | C:\Users\Admin\AppData\Local\Temp\cfe9b79faf455e5ba96d1949d24af3bc4ea4671ade277df1a9674ab538c62c9d.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bandera = "C:\\ProgramData\\rdpclient.exe" | C:\Users\Admin\AppData\Local\Temp\cfe9b79faf455e5ba96d1949d24af3bc4ea4671ade277df1a9674ab538c62c9d.exe | N/A |
Enumerates connected drives
Drops file in Program Files directory
Processes
C:\Users\Admin\AppData\Local\Temp\cfe9b79faf455e5ba96d1949d24af3bc4ea4671ade277df1a9674ab538c62c9d.exe
"C:\Users\Admin\AppData\Local\Temp\cfe9b79faf455e5ba96d1949d24af3bc4ea4671ade277df1a9674ab538c62c9d.exe"
Network
Files
memory/1152-132-0x0000022F3E3A0000-0x0000022F3E3A4000-memory.dmp
memory/1152-133-0x00007FF6E9170000-0x00007FF6E9186000-memory.dmp
memory/1152-136-0x0000022F3E3A0000-0x0000022F3E3A4000-memory.dmp
memory/1152-135-0x0000022F3E390000-0x0000022F3E395000-memory.dmp
memory/1152-134-0x0000022F3E370000-0x0000022F3E377000-memory.dmp