Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
23/08/2023, 21:54
Static task
static1
Behavioral task
behavioral1
Sample
c77fc75873e2212bfc9301781ccf01480c8957e58d2be9e0f74640e93b5617df.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
c77fc75873e2212bfc9301781ccf01480c8957e58d2be9e0f74640e93b5617df.exe
Resource
win10v2004-20230703-en
General
-
Target
c77fc75873e2212bfc9301781ccf01480c8957e58d2be9e0f74640e93b5617df.exe
-
Size
6.4MB
-
MD5
7671c0e8d76c507079cd4be6afacbdbc
-
SHA1
d9179fdf66f974d5502a20ad8aa0fcbffa7cc4ef
-
SHA256
c77fc75873e2212bfc9301781ccf01480c8957e58d2be9e0f74640e93b5617df
-
SHA512
054db5fdae00cb145de68d121586f0396628982ae5f72bec8c4cdeb3f32e08e6006ba88e7ef56da28caacbfdd54bc758b32e490397677d3dce0ac4d267293a1c
-
SSDEEP
98304:/mzDhXSWSDKuCPPe0DwcJBAUZLsyxrCVgZMPpQApOqhDidLqgp2EDAFeGqdRj:/mQEZjJVQysGZSNpOqh28TEkFkv
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2800-1-0x0000000000260000-0x000000000026B000-memory.dmp upx behavioral1/memory/2800-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2800-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2800-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2800-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2800-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2800-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2800-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2800-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2800-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2800-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2800-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2800-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2800-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2800-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2800-28-0x0000000000260000-0x000000000026B000-memory.dmp upx behavioral1/memory/2800-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2800-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2800-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2800-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2800-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2800-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2800-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2800-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2800-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2800-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2800-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2800-52-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2800-53-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: c77fc75873e2212bfc9301781ccf01480c8957e58d2be9e0f74640e93b5617df.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2800 c77fc75873e2212bfc9301781ccf01480c8957e58d2be9e0f74640e93b5617df.exe 2800 c77fc75873e2212bfc9301781ccf01480c8957e58d2be9e0f74640e93b5617df.exe 2800 c77fc75873e2212bfc9301781ccf01480c8957e58d2be9e0f74640e93b5617df.exe