Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2023 02:07
Static task
static1
Behavioral task
behavioral1
Sample
73f88416fd93f440b124192ca7ce202244bcb11ade88acd6cc4a8d417719d921.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
73f88416fd93f440b124192ca7ce202244bcb11ade88acd6cc4a8d417719d921.exe
Resource
win10v2004-20230915-en
General
-
Target
73f88416fd93f440b124192ca7ce202244bcb11ade88acd6cc4a8d417719d921.exe
-
Size
2.2MB
-
MD5
3f0d37881a8c7af5d7c98c89130c6291
-
SHA1
a7f4347e9ee3f2c6baf954356fe0f19e5330a120
-
SHA256
73f88416fd93f440b124192ca7ce202244bcb11ade88acd6cc4a8d417719d921
-
SHA512
4e91dfb8d2e2d981f55518fb03391f88e076c16fffaa3a84e0cd973e832f077c8d0d1f65d952b3a5d4bc3a01726d92f688fc7e4bf0d0e6cd9e2b896b1093d64b
-
SSDEEP
49152:GmgyrMB83RZiIXgFPtJg3MVn2u7wB4z9b5ONRn:cyyKRZiIuW3MVn2qiQ5sNt
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: 73f88416fd93f440b124192ca7ce202244bcb11ade88acd6cc4a8d417719d921.exe File opened (read-only) \??\h: 73f88416fd93f440b124192ca7ce202244bcb11ade88acd6cc4a8d417719d921.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2188 73f88416fd93f440b124192ca7ce202244bcb11ade88acd6cc4a8d417719d921.exe 2188 73f88416fd93f440b124192ca7ce202244bcb11ade88acd6cc4a8d417719d921.exe 2188 73f88416fd93f440b124192ca7ce202244bcb11ade88acd6cc4a8d417719d921.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2188 73f88416fd93f440b124192ca7ce202244bcb11ade88acd6cc4a8d417719d921.exe 2188 73f88416fd93f440b124192ca7ce202244bcb11ade88acd6cc4a8d417719d921.exe 2188 73f88416fd93f440b124192ca7ce202244bcb11ade88acd6cc4a8d417719d921.exe 2188 73f88416fd93f440b124192ca7ce202244bcb11ade88acd6cc4a8d417719d921.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\73f88416fd93f440b124192ca7ce202244bcb11ade88acd6cc4a8d417719d921.exe"C:\Users\Admin\AppData\Local\Temp\73f88416fd93f440b124192ca7ce202244bcb11ade88acd6cc4a8d417719d921.exe"1⤵
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2188