Analysis Overview
SHA256
0d654bd41f1aa5790624656e942f317e5984d139a3f17cb6f167544d713609a8
Threat Level: Known bad
The file 0d654bd41f1aa5790624656e942f317e5984d139a3f17cb6f167544d713609a8.exe was found to be: Known bad.
Malicious Activity Summary
Azov
Adds Run key to start application
Enumerates connected drives
Drops file in Program Files directory
Unsigned PE
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2023-10-18 11:02
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral3
Detonation Overview
Submitted
2023-10-18 11:02
Reported
2023-10-18 11:05
Platform
win10v2004-20230915-en
Max time kernel
135s
Max time network
161s
Command Line
Signatures
Azov
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bandera = "C:\\ProgramData\\rdpclient.exe" | C:\Users\Admin\AppData\Local\Temp\0d654bd41f1aa5790624656e942f317e5984d139a3f17cb6f167544d713609a8.exe | N/A |
Enumerates connected drives
Drops file in Program Files directory
Processes
C:\Users\Admin\AppData\Local\Temp\0d654bd41f1aa5790624656e942f317e5984d139a3f17cb6f167544d713609a8.exe
"C:\Users\Admin\AppData\Local\Temp\0d654bd41f1aa5790624656e942f317e5984d139a3f17cb6f167544d713609a8.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 208.194.73.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 254.7.248.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 108.211.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 59.128.231.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 1.208.79.178.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 254.5.248.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 168.117.168.52.in-addr.arpa | udp |
Files
memory/1168-0-0x0000000000E80000-0x0000000000E86000-memory.dmp
memory/1168-3-0x0000000000EA0000-0x0000000000EA5000-memory.dmp
memory/1168-1-0x0000000000EB0000-0x0000000000EB4000-memory.dmp
memory/1168-4-0x00007FF70D470000-0x00007FF70D494000-memory.dmp
memory/1168-6-0x0000000000EB0000-0x0000000000EB4000-memory.dmp
memory/1168-10-0x0000000000EA0000-0x0000000000EA5000-memory.dmp
memory/1168-12-0x0000000000EA0000-0x0000000000EA5000-memory.dmp
C:\Program Files\7-Zip\RESTORE_FILES.txt
| MD5 | 4f3332a48d767cc5bdfdab755d84a450 |
| SHA1 | d7d583c08e82f39637d8209447c2c9cad1478f01 |
| SHA256 | a04e8cc0ea5f7e143eba012c2bc470161f1faf9c904eb233f777ced8e6e706ad |
| SHA512 | 0f60de7622aa69ae0b209a1ed54ec7ba0f6b81b597565e64d41845bec8c471a768ca8622964260c448530f637492aac31a4fc5ec95de147ef2c0d89149c2a66f |
Analysis: behavioral1
Detonation Overview
Submitted
2023-10-18 11:02
Reported
2023-10-18 11:05
Platform
win7-20230831-en
Max time kernel
117s
Max time network
123s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\0d654bd41f1aa5790624656e942f317e5984d139a3f17cb6f167544d713609a8.exe
"C:\Users\Admin\AppData\Local\Temp\0d654bd41f1aa5790624656e942f317e5984d139a3f17cb6f167544d713609a8.exe"
Network
Files
memory/2808-1-0x0000000000110000-0x0000000000114000-memory.dmp
memory/2808-0-0x00000000000E0000-0x00000000000E6000-memory.dmp
memory/2808-2-0x0000000000100000-0x0000000000105000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2023-10-18 11:02
Reported
2023-10-18 11:05
Platform
win10-20230915-en
Max time kernel
116s
Max time network
123s
Command Line
Signatures
Azov
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bandera = "C:\\ProgramData\\rdpclient.exe" | C:\Users\Admin\AppData\Local\Temp\0d654bd41f1aa5790624656e942f317e5984d139a3f17cb6f167544d713609a8.exe | N/A |
Enumerates connected drives
Drops file in Program Files directory
Processes
C:\Users\Admin\AppData\Local\Temp\0d654bd41f1aa5790624656e942f317e5984d139a3f17cb6f167544d713609a8.exe
"C:\Users\Admin\AppData\Local\Temp\0d654bd41f1aa5790624656e942f317e5984d139a3f17cb6f167544d713609a8.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 23.236.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.201.50.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 112.208.253.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 108.211.229.192.in-addr.arpa | udp |
Files
memory/2412-1-0x0000000001590000-0x0000000001594000-memory.dmp
memory/2412-2-0x0000000001580000-0x0000000001585000-memory.dmp
memory/2412-0-0x00000000012E0000-0x00000000012E6000-memory.dmp
memory/2412-4-0x00007FF745090000-0x00007FF7450B4000-memory.dmp
memory/2412-6-0x0000000001590000-0x0000000001594000-memory.dmp
memory/2412-7-0x0000000001580000-0x0000000001585000-memory.dmp
memory/2412-8-0x0000000001580000-0x0000000001585000-memory.dmp
C:\Program Files\7-Zip\RESTORE_FILES.txt
| MD5 | 4f3332a48d767cc5bdfdab755d84a450 |
| SHA1 | d7d583c08e82f39637d8209447c2c9cad1478f01 |
| SHA256 | a04e8cc0ea5f7e143eba012c2bc470161f1faf9c904eb233f777ced8e6e706ad |
| SHA512 | 0f60de7622aa69ae0b209a1ed54ec7ba0f6b81b597565e64d41845bec8c471a768ca8622964260c448530f637492aac31a4fc5ec95de147ef2c0d89149c2a66f |