Analysis
-
max time kernel
145s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
19/08/2023, 20:33 UTC
Behavioral task
behavioral1
Sample
f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe
Resource
win10v2004-20230703-en
General
-
Target
f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe
-
Size
10.6MB
-
MD5
c6d3593f79e00d002f3393c7613fa590
-
SHA1
606371e8caea5cd12de5eec0a6a69070b01d6001
-
SHA256
f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70
-
SHA512
c7316b2c4fad684b182825c4d20d7b1cce84d45d7294854c2ce9898b130a19097bd9160f10c42b8128771f32967e393db90872a40281f4b14811655dc6975b80
-
SSDEEP
196608:tQpH0Fx5ogvPYOrs1UalsCN99veeSk6LI9C0brLbDZ0IHK/IzAZyn2ah7dLj:tnfYOQ1UalvN9FWIAYLfNHKwz+i2apdL
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1380-84-0x0000000000400000-0x0000000000F72000-memory.dmp upx behavioral1/memory/1380-97-0x0000000000400000-0x0000000000F72000-memory.dmp upx behavioral1/memory/1380-101-0x0000000000400000-0x0000000000F72000-memory.dmp upx behavioral1/memory/1380-102-0x0000000000400000-0x0000000000F72000-memory.dmp upx behavioral1/memory/1380-110-0x0000000000400000-0x0000000000F72000-memory.dmp upx behavioral1/memory/1380-112-0x0000000000400000-0x0000000000F72000-memory.dmp upx -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\J: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\Y: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\I: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\L: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\P: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\W: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\H: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\M: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\O: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\Q: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\R: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\T: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\U: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\E: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\K: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\N: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\S: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\V: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\X: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe File opened (read-only) \??\Z: f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2524 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2524 wrote to memory of 1380 2524 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 28 PID 2524 wrote to memory of 1380 2524 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 28 PID 2524 wrote to memory of 1380 2524 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 28 PID 2524 wrote to memory of 1380 2524 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 28 PID 2524 wrote to memory of 1380 2524 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 28 PID 2524 wrote to memory of 1380 2524 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 28 PID 2524 wrote to memory of 1380 2524 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 28 PID 2524 wrote to memory of 1380 2524 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 28 PID 2524 wrote to memory of 1380 2524 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 28 PID 2524 wrote to memory of 1380 2524 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 28 PID 2524 wrote to memory of 1380 2524 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 28 PID 2524 wrote to memory of 1380 2524 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 28 PID 2524 wrote to memory of 1380 2524 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 28 PID 2524 wrote to memory of 1380 2524 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 28 PID 2524 wrote to memory of 1380 2524 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 28 PID 2524 wrote to memory of 1380 2524 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 28 PID 2524 wrote to memory of 1380 2524 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 28 PID 2524 wrote to memory of 1380 2524 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 28 PID 2524 wrote to memory of 1380 2524 f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe"C:\Users\Admin\AppData\Local\Temp\f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe"C:\Users\Admin\AppData\Local\Temp\f953da1f775dd7806453192360c0b0c0a92d40e94c78c061a73226b531a4bb70.exe"2⤵
- Enumerates connected drives
PID:1380
-