Analysis
-
max time kernel
160s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 22:13
Behavioral task
behavioral1
Sample
1f224a95d5c03ddb4ae31346aee621cfd26f68f358ff4baaa628c9a9358b8f3c.exe
Resource
win7-20230831-en
windows7-x64
5 signatures
150 seconds
General
-
Target
1f224a95d5c03ddb4ae31346aee621cfd26f68f358ff4baaa628c9a9358b8f3c.exe
-
Size
15.5MB
-
MD5
f2c9e2a55730e0845fa01a4d5a5f6b60
-
SHA1
fcf6b6620a695bf2befb5a16f75170a37c6f6eb8
-
SHA256
1f224a95d5c03ddb4ae31346aee621cfd26f68f358ff4baaa628c9a9358b8f3c
-
SHA512
476d3b5a18318384aec507cdf0bd514e32dfaac34d5b16404567a4a90de96bcf7a058e58b20996eab75dbe01bb471469a6e2d3c8a4224578b50d0d9f474cfdc8
-
SSDEEP
393216:ysbF+nMAe4EPC4n7QcoNYz0dQ5mv4BDgyc9HOzPNn/FueDy:K92nz0dpb+1/8eDy
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2756-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2756-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2756-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2756-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2756-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2756-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2756-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2756-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2756-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2756-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2756-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2756-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2756-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2756-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2756-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2756-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2756-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2756-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2756-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2756-53-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2756-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2756-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2756-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2756-61-0x0000000003E80000-0x0000000003EA6000-memory.dmp upx behavioral2/memory/2756-63-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2756-62-0x0000000003EB0000-0x0000000003ED6000-memory.dmp upx behavioral2/memory/2756-64-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2756-65-0x0000000003E80000-0x0000000003EA6000-memory.dmp upx behavioral2/memory/2756-66-0x0000000003EB0000-0x0000000003ED6000-memory.dmp upx -
resource yara_rule behavioral2/memory/2756-3-0x0000000000400000-0x0000000001D35000-memory.dmp vmprotect behavioral2/memory/2756-39-0x0000000000400000-0x0000000001D35000-memory.dmp vmprotect -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 1f224a95d5c03ddb4ae31346aee621cfd26f68f358ff4baaa628c9a9358b8f3c.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2756 1f224a95d5c03ddb4ae31346aee621cfd26f68f358ff4baaa628c9a9358b8f3c.exe 2756 1f224a95d5c03ddb4ae31346aee621cfd26f68f358ff4baaa628c9a9358b8f3c.exe 2756 1f224a95d5c03ddb4ae31346aee621cfd26f68f358ff4baaa628c9a9358b8f3c.exe 2756 1f224a95d5c03ddb4ae31346aee621cfd26f68f358ff4baaa628c9a9358b8f3c.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2756 1f224a95d5c03ddb4ae31346aee621cfd26f68f358ff4baaa628c9a9358b8f3c.exe 2756 1f224a95d5c03ddb4ae31346aee621cfd26f68f358ff4baaa628c9a9358b8f3c.exe 2756 1f224a95d5c03ddb4ae31346aee621cfd26f68f358ff4baaa628c9a9358b8f3c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f224a95d5c03ddb4ae31346aee621cfd26f68f358ff4baaa628c9a9358b8f3c.exe"C:\Users\Admin\AppData\Local\Temp\1f224a95d5c03ddb4ae31346aee621cfd26f68f358ff4baaa628c9a9358b8f3c.exe"1⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2756