Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
26/08/2023, 09:26
Behavioral task
behavioral1
Sample
07d004e5eb5719b6ae236cad6dc4c850e27ff99054b4ebebd2ff0137291069fd.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
07d004e5eb5719b6ae236cad6dc4c850e27ff99054b4ebebd2ff0137291069fd.exe
Resource
win10v2004-20230703-en
General
-
Target
07d004e5eb5719b6ae236cad6dc4c850e27ff99054b4ebebd2ff0137291069fd.exe
-
Size
5.3MB
-
MD5
076579896c948e1c2d6828c985a13aac
-
SHA1
f61da398669160ef6dbfbe71fb0bf01c262e541a
-
SHA256
07d004e5eb5719b6ae236cad6dc4c850e27ff99054b4ebebd2ff0137291069fd
-
SHA512
737279195a8feb9aef460bd86688ea0a7bc0be3c900ceed132107ee878bf0503723a50ea85c6e2d003c903027c920bad5e82c78d1c16d925b75231f788a45d8d
-
SSDEEP
98304:rkZ/0e1DNstR9XUokx0AJ87k/QljWCXbz49:g6f/9XUjxNJ8FjW2I9
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1400-0-0x0000000000400000-0x0000000001098000-memory.dmp upx behavioral1/memory/1400-1-0x0000000000400000-0x0000000001098000-memory.dmp upx behavioral1/memory/1400-4-0x0000000000400000-0x0000000001098000-memory.dmp upx -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 07d004e5eb5719b6ae236cad6dc4c850e27ff99054b4ebebd2ff0137291069fd.exe File opened (read-only) \??\G: 07d004e5eb5719b6ae236cad6dc4c850e27ff99054b4ebebd2ff0137291069fd.exe File opened (read-only) \??\H: 07d004e5eb5719b6ae236cad6dc4c850e27ff99054b4ebebd2ff0137291069fd.exe File opened (read-only) \??\Q: 07d004e5eb5719b6ae236cad6dc4c850e27ff99054b4ebebd2ff0137291069fd.exe File opened (read-only) \??\R: 07d004e5eb5719b6ae236cad6dc4c850e27ff99054b4ebebd2ff0137291069fd.exe File opened (read-only) \??\L: 07d004e5eb5719b6ae236cad6dc4c850e27ff99054b4ebebd2ff0137291069fd.exe File opened (read-only) \??\S: 07d004e5eb5719b6ae236cad6dc4c850e27ff99054b4ebebd2ff0137291069fd.exe File opened (read-only) \??\T: 07d004e5eb5719b6ae236cad6dc4c850e27ff99054b4ebebd2ff0137291069fd.exe File opened (read-only) \??\U: 07d004e5eb5719b6ae236cad6dc4c850e27ff99054b4ebebd2ff0137291069fd.exe File opened (read-only) \??\I: 07d004e5eb5719b6ae236cad6dc4c850e27ff99054b4ebebd2ff0137291069fd.exe File opened (read-only) \??\J: 07d004e5eb5719b6ae236cad6dc4c850e27ff99054b4ebebd2ff0137291069fd.exe File opened (read-only) \??\K: 07d004e5eb5719b6ae236cad6dc4c850e27ff99054b4ebebd2ff0137291069fd.exe File opened (read-only) \??\M: 07d004e5eb5719b6ae236cad6dc4c850e27ff99054b4ebebd2ff0137291069fd.exe File opened (read-only) \??\P: 07d004e5eb5719b6ae236cad6dc4c850e27ff99054b4ebebd2ff0137291069fd.exe File opened (read-only) \??\X: 07d004e5eb5719b6ae236cad6dc4c850e27ff99054b4ebebd2ff0137291069fd.exe File opened (read-only) \??\Y: 07d004e5eb5719b6ae236cad6dc4c850e27ff99054b4ebebd2ff0137291069fd.exe File opened (read-only) \??\N: 07d004e5eb5719b6ae236cad6dc4c850e27ff99054b4ebebd2ff0137291069fd.exe File opened (read-only) \??\O: 07d004e5eb5719b6ae236cad6dc4c850e27ff99054b4ebebd2ff0137291069fd.exe File opened (read-only) \??\V: 07d004e5eb5719b6ae236cad6dc4c850e27ff99054b4ebebd2ff0137291069fd.exe File opened (read-only) \??\W: 07d004e5eb5719b6ae236cad6dc4c850e27ff99054b4ebebd2ff0137291069fd.exe File opened (read-only) \??\Z: 07d004e5eb5719b6ae236cad6dc4c850e27ff99054b4ebebd2ff0137291069fd.exe