Overview
overview
10Static
static
107za.exe
windows7-x64
17za.exe
windows10-2004-x64
1Amigodainapasik.exe
windows7-x64
10Amigodainapasik.exe
windows10-2004-x64
10Everything.exe
windows7-x64
6Everything.exe
windows10-2004-x64
6Everything32.dll
windows7-x64
1Everything32.dll
windows10-2004-x64
1sdel.exe
windows7-x64
1sdel.exe
windows10-2004-x64
1sdel64.exe
windows7-x64
1sdel64.exe
windows10-2004-x64
1Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2023 16:13
Behavioral task
behavioral1
Sample
7za.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
7za.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
Amigodainapasik.exe
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
Amigodainapasik.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
Everything.exe
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
Everything.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
Everything32.dll
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
Everything32.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
sdel.exe
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
sdel.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
sdel64.exe
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
sdel64.exe
Resource
win10v2004-20230703-en
General
-
Target
Everything.exe
-
Size
1.7MB
-
MD5
c44487ce1827ce26ac4699432d15b42a
-
SHA1
8434080fad778057a50607364fee8b481f0feef8
-
SHA256
4c83e46a29106afbaf5279029d102b489d958781764289b61ab5b618a4307405
-
SHA512
a0ea698333c21e59b5bc79d79ff39d185a019cede394dbd8b2eb72c4230001685a90098a691c296aeab27db6751eef56c4261cf00f790de2e9e9efc0e7f7c808
-
SSDEEP
49152:sVzyP4BTkT3EApTLi2CCzMn3jzjAhFEy+eaXr:sVzyABTwEH
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: Everything.exe File opened (read-only) \??\O: Everything.exe File opened (read-only) \??\R: Everything.exe File opened (read-only) \??\Y: Everything.exe File opened (read-only) \??\A: Everything.exe File opened (read-only) \??\E: Everything.exe File opened (read-only) \??\I: Everything.exe File opened (read-only) \??\L: Everything.exe File opened (read-only) \??\N: Everything.exe File opened (read-only) \??\T: Everything.exe File opened (read-only) \??\H: Everything.exe File opened (read-only) \??\J: Everything.exe File opened (read-only) \??\Q: Everything.exe File opened (read-only) \??\W: Everything.exe File opened (read-only) \??\X: Everything.exe File opened (read-only) \??\V: Everything.exe File opened (read-only) \??\Z: Everything.exe File opened (read-only) \??\G: Everything.exe File opened (read-only) \??\K: Everything.exe File opened (read-only) \??\M: Everything.exe File opened (read-only) \??\P: Everything.exe File opened (read-only) \??\S: Everything.exe File opened (read-only) \??\U: Everything.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1536 Everything.exe