Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
20/08/2023, 21:11
Static task
static1
Behavioral task
behavioral1
Sample
043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe
Resource
win10v2004-20230703-en
General
-
Target
043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe
-
Size
12.4MB
-
MD5
86e472a9fc6fad3f9eb2521af41ba768
-
SHA1
bf6d8584446ab2861ae47ed4827d8a6b144e8814
-
SHA256
043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8
-
SHA512
9e4df870e1ac0027a7c39d27d500b91b93dfcbc7b4a1f2793f453357d7cec076df54015f351b808e3bce8fea9a23004adf6faedcf317a9844a232909f309c943
-
SSDEEP
196608:q4HKDQBKkXy+Xbt815j5tDobSUFQm6xcejuQgZ:qaK0BK+Kvj5t0ZFQm6uejuQ6
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2236-8748-0x00000000002F0000-0x00000000002FB000-memory.dmp upx behavioral1/memory/2236-8749-0x0000000000310000-0x0000000000318000-memory.dmp upx behavioral1/memory/2236-8752-0x0000000000300000-0x000000000030B000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe File opened (read-only) \??\O: 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe File opened (read-only) \??\R: 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe File opened (read-only) \??\J: 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe File opened (read-only) \??\L: 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe File opened (read-only) \??\S: 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe File opened (read-only) \??\U: 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe File opened (read-only) \??\H: 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe File opened (read-only) \??\T: 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe File opened (read-only) \??\W: 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe File opened (read-only) \??\X: 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe File opened (read-only) \??\M: 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe File opened (read-only) \??\N: 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe File opened (read-only) \??\P: 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe File opened (read-only) \??\A: 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe File opened (read-only) \??\E: 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe File opened (read-only) \??\G: 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe File opened (read-only) \??\I: 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe File opened (read-only) \??\K: 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe File opened (read-only) \??\Q: 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe File opened (read-only) \??\V: 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe File opened (read-only) \??\Y: 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe File opened (read-only) \??\Z: 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 27 IoCs
pid Process 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe 2236 043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe"C:\Users\Admin\AppData\Local\Temp\043956786edbb6f972d6258777ad8de506e913106d6cef10c280eb74207b64e8.exe"1⤵
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2236