Analysis
-
max time kernel
30s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2023 04:03
Behavioral task
behavioral1
Sample
Akrien premium 4.0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Akrien premium 4.0.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
crack.bat
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
crack.bat
Resource
win10v2004-20230915-en
General
-
Target
Akrien premium 4.0.exe
-
Size
4.3MB
-
MD5
58d82461f610bf5234c28a1a67cbd123
-
SHA1
6aac74dd950ee1a9b14adaabb1fea942fc921ac9
-
SHA256
63b24a2fbe28c375ca03f45592b7dcbfdfed9262f1ad51efb6bd544429a885d0
-
SHA512
52d9f2daa360f7e84bc764092076d50216687f6c4c22afd3e3017188f1cb3ab2eafce76b968cd1f6feb412639277cf3439fe613647cdffa216dfa30bf0580ef2
-
SSDEEP
49152:g/5tJDBRnrQkbB1CjaorTkjf5O5rihkRbxdkkYgpX6tkWuiZMh5WEWkwwTMj:ab6SROk7AOkwZ
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Akrien premium 4.0.exedescription ioc Process File opened (read-only) \??\F: Akrien premium 4.0.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
Akrien premium 4.0.exepid Process 2008 Akrien premium 4.0.exe 2008 Akrien premium 4.0.exe 2008 Akrien premium 4.0.exe 2008 Akrien premium 4.0.exe 2008 Akrien premium 4.0.exe 2008 Akrien premium 4.0.exe