Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
20/08/2023, 21:38
Static task
static1
Behavioral task
behavioral1
Sample
6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe
Resource
win10v2004-20230703-en
General
-
Target
6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe
-
Size
768KB
-
MD5
c220b9c396c9099c6c8afb4ac2c289f7
-
SHA1
7ce6421d70883d83da98cc15b1861288fc4279c8
-
SHA256
6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc
-
SHA512
b3f139c8b3591ad17b09838b9f9889185c12cd76d7f0b9b7d14ffa3e6e9b26b7ebcafa2de864568edb1b10d798abe729738b3933ec5504aeffd39f85660e9d3c
-
SSDEEP
12288:Ys6RalcXFfAqhXXFSBCz4IxgqeLmS+w/L8l2rSOMVu8hKb+TETtGRCPw3ZqV6P8l:nd6xvppVxgRLmwz8souKkjPwg6P8b
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: 6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe File opened (read-only) \??\Y: 6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe File opened (read-only) \??\B: 6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe File opened (read-only) \??\E: 6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe File opened (read-only) \??\I: 6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe File opened (read-only) \??\J: 6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe File opened (read-only) \??\R: 6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe File opened (read-only) \??\T: 6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe File opened (read-only) \??\V: 6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe File opened (read-only) \??\X: 6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe File opened (read-only) \??\G: 6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe File opened (read-only) \??\K: 6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe File opened (read-only) \??\N: 6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe File opened (read-only) \??\O: 6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe File opened (read-only) \??\Z: 6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe File opened (read-only) \??\H: 6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe File opened (read-only) \??\S: 6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe File opened (read-only) \??\U: 6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe File opened (read-only) \??\L: 6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe File opened (read-only) \??\P: 6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe File opened (read-only) \??\Q: 6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe File opened (read-only) \??\W: 6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1736 6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1736 6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe"C:\Users\Admin\AppData\Local\Temp\6783184605303e758bc26fe891233d23ee6a8385031989867d16eb3498482bbc.exe"1⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1736