Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2023 16:51
Behavioral task
behavioral1
Sample
Aws.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Aws.exe
Resource
win10v2004-20230221-en
General
-
Target
Aws.exe
-
Size
717KB
-
MD5
8f903f5e72c2e75be929ba9387eca6e0
-
SHA1
35f72f4c3cd30b4edcbefdcfa1e6eb4005c9dbab
-
SHA256
507462d586444bb57dfc8a7962a018c30891855e1187f79472eb87bacd346389
-
SHA512
ce8c33dda613d79ecdcb2e8483f541deeb6d6e57f070ab128600369bf506c2c466385a015ce8b2d3209e5b470edf6b604cfed3fd99efe5ac5b5b42aa38b524ce
-
SSDEEP
12288:EAjq4FpXdEQVyDLYRx1DOkl4vF4iPlAVrV2nc9dnbPk41C5DJsJNQ:7+mXmtLYRKkI4ilAV0nIRbkhJ3
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Aws.exedescription ioc process File opened (read-only) \??\l: Aws.exe File opened (read-only) \??\q: Aws.exe File opened (read-only) \??\r: Aws.exe File opened (read-only) \??\t: Aws.exe File opened (read-only) \??\w: Aws.exe File opened (read-only) \??\x: Aws.exe File opened (read-only) \??\i: Aws.exe File opened (read-only) \??\p: Aws.exe File opened (read-only) \??\s: Aws.exe File opened (read-only) \??\z: Aws.exe File opened (read-only) \??\b: Aws.exe File opened (read-only) \??\j: Aws.exe File opened (read-only) \??\k: Aws.exe File opened (read-only) \??\o: Aws.exe File opened (read-only) \??\u: Aws.exe File opened (read-only) \??\v: Aws.exe File opened (read-only) \??\a: Aws.exe File opened (read-only) \??\e: Aws.exe File opened (read-only) \??\f: Aws.exe File opened (read-only) \??\g: Aws.exe File opened (read-only) \??\h: Aws.exe File opened (read-only) \??\m: Aws.exe File opened (read-only) \??\n: Aws.exe File opened (read-only) \??\y: Aws.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
Aws.exedescription ioc process File opened for modification \??\PhysicalDrive0 Aws.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Aws.exepid process 2516 Aws.exe 2516 Aws.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Aws.exepid process 2516 Aws.exe 2516 Aws.exe