Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
23/09/2023, 04:36
Behavioral task
behavioral1
Sample
13f76899aed7f6859855cf38ab096b468f1c0aff54d6af4d377ba407b575510b.exe
Resource
win7-20230831-en
5 signatures
150 seconds
General
-
Target
13f76899aed7f6859855cf38ab096b468f1c0aff54d6af4d377ba407b575510b.exe
-
Size
11.2MB
-
MD5
c42f7220fe086b0aa3887d8c7a8a1dbf
-
SHA1
c5776a3d7f45e322e831e7cdb76457b1d1a60811
-
SHA256
13f76899aed7f6859855cf38ab096b468f1c0aff54d6af4d377ba407b575510b
-
SHA512
d64f608a6231d363f4aa50ccc55ac152d684ae0acc8589e30233e07c1a557bd266f8eb0e77887ec7879b9621df031e4618911083b301781fecb66c58cd2d2131
-
SSDEEP
196608:Np0XRDVuU0jXY9TUpPhLTQdnLL0RRBaJ1mS1cUUWqWIQIlFWMyn7DZ4bl:z0X+U4umZTQdnv2B+n1c4qWIZSMsJ4
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1328-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1328-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1328-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1328-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1328-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1328-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1328-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1328-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1328-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1328-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1328-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1328-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1328-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1328-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1328-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1328-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1328-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1328-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1328-52-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1328-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1328-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1328-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1328-61-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1328-64-0x0000000004690000-0x000000000469B000-memory.dmp upx behavioral2/memory/1328-65-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1328-70-0x0000000004690000-0x000000000469B000-memory.dmp upx -
resource yara_rule behavioral2/memory/1328-6-0x0000000000400000-0x0000000002282000-memory.dmp vmprotect -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 13f76899aed7f6859855cf38ab096b468f1c0aff54d6af4d377ba407b575510b.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1328 13f76899aed7f6859855cf38ab096b468f1c0aff54d6af4d377ba407b575510b.exe 1328 13f76899aed7f6859855cf38ab096b468f1c0aff54d6af4d377ba407b575510b.exe 1328 13f76899aed7f6859855cf38ab096b468f1c0aff54d6af4d377ba407b575510b.exe 1328 13f76899aed7f6859855cf38ab096b468f1c0aff54d6af4d377ba407b575510b.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1328 13f76899aed7f6859855cf38ab096b468f1c0aff54d6af4d377ba407b575510b.exe 1328 13f76899aed7f6859855cf38ab096b468f1c0aff54d6af4d377ba407b575510b.exe 1328 13f76899aed7f6859855cf38ab096b468f1c0aff54d6af4d377ba407b575510b.exe 1328 13f76899aed7f6859855cf38ab096b468f1c0aff54d6af4d377ba407b575510b.exe 1328 13f76899aed7f6859855cf38ab096b468f1c0aff54d6af4d377ba407b575510b.exe 1328 13f76899aed7f6859855cf38ab096b468f1c0aff54d6af4d377ba407b575510b.exe 1328 13f76899aed7f6859855cf38ab096b468f1c0aff54d6af4d377ba407b575510b.exe 1328 13f76899aed7f6859855cf38ab096b468f1c0aff54d6af4d377ba407b575510b.exe 1328 13f76899aed7f6859855cf38ab096b468f1c0aff54d6af4d377ba407b575510b.exe 1328 13f76899aed7f6859855cf38ab096b468f1c0aff54d6af4d377ba407b575510b.exe 1328 13f76899aed7f6859855cf38ab096b468f1c0aff54d6af4d377ba407b575510b.exe 1328 13f76899aed7f6859855cf38ab096b468f1c0aff54d6af4d377ba407b575510b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13f76899aed7f6859855cf38ab096b468f1c0aff54d6af4d377ba407b575510b.exe"C:\Users\Admin\AppData\Local\Temp\13f76899aed7f6859855cf38ab096b468f1c0aff54d6af4d377ba407b575510b.exe"1⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1328