Analysis
-
max time kernel
142s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 14:09
Static task
static1
Behavioral task
behavioral1
Sample
550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe
Resource
win10v2004-20230915-en
General
-
Target
550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe
-
Size
11.3MB
-
MD5
9fa5cf1566f5804b09c71cfd2a5c8520
-
SHA1
470b477f94d6ede702f7312b88b16ae23d728da4
-
SHA256
550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22
-
SHA512
88b55f1273a36ef79500d2cca92a90c1df765537486b7f12b6dddc2325f8161c6b25c57765fd28f21c739f52de9cb8ebec1c70fd693f4789500fe1366c01eabb
-
SSDEEP
196608:vyQ5L6m1GjKFKWUGNEoiN/A4sXru7JoE4++HHPXCMMUzoUG55Y:Gm1Gj3pGNv7i8++n6/7UG52
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe File opened (read-only) \??\R: 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe File opened (read-only) \??\V: 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe File opened (read-only) \??\E: 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe File opened (read-only) \??\J: 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe File opened (read-only) \??\N: 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe File opened (read-only) \??\M: 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe File opened (read-only) \??\T: 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe File opened (read-only) \??\U: 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe File opened (read-only) \??\Y: 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe File opened (read-only) \??\G: 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe File opened (read-only) \??\H: 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe File opened (read-only) \??\P: 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe File opened (read-only) \??\K: 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe File opened (read-only) \??\L: 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe File opened (read-only) \??\O: 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe File opened (read-only) \??\S: 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe File opened (read-only) \??\W: 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe File opened (read-only) \??\A: 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe File opened (read-only) \??\B: 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe File opened (read-only) \??\I: 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe File opened (read-only) \??\X: 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe File opened (read-only) \??\Z: 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1408 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe 1408 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe 1408 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe 1408 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe 1408 550bb15725153e19dd8ac84a1e8d2fb3e2b9261842dba94a680b238e2bcedd22.exe