Analysis Overview
SHA256
0d654bd41f1aa5790624656e942f317e5984d139a3f17cb6f167544d713609a8
Threat Level: Known bad
The file 0d654bd41f1aa5790624656e942f317e5984d139a3f17cb6f167544d713609a8.exe was found to be: Known bad.
Malicious Activity Summary
Azov
Adds Run key to start application
Enumerates connected drives
Drops file in Program Files directory
Unsigned PE
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2023-10-18 12:07
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2023-10-18 12:07
Reported
2023-10-18 12:10
Platform
win7-20230831-en
Max time kernel
120s
Max time network
129s
Command Line
Signatures
Azov
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bandera = "C:\\ProgramData\\rdpclient.exe" | C:\Users\Admin\AppData\Local\Temp\0d654bd41f1aa5790624656e942f317e5984d139a3f17cb6f167544d713609a8.exe | N/A |
Enumerates connected drives
Drops file in Program Files directory
Processes
C:\Users\Admin\AppData\Local\Temp\0d654bd41f1aa5790624656e942f317e5984d139a3f17cb6f167544d713609a8.exe
"C:\Users\Admin\AppData\Local\Temp\0d654bd41f1aa5790624656e942f317e5984d139a3f17cb6f167544d713609a8.exe"
Network
Files
memory/3044-0-0x0000000000110000-0x0000000000114000-memory.dmp
memory/3044-2-0x00000000000E0000-0x00000000000E6000-memory.dmp
memory/3044-4-0x00000000FF140000-0x00000000FF164000-memory.dmp
memory/3044-3-0x0000000000100000-0x0000000000105000-memory.dmp
memory/3044-5-0x0000000000110000-0x0000000000114000-memory.dmp
memory/3044-7-0x0000000000100000-0x0000000000105000-memory.dmp
memory/3044-9-0x0000000000100000-0x0000000000105000-memory.dmp
C:\Program Files\7-Zip\Lang\RESTORE_FILES.txt
| MD5 | 4f3332a48d767cc5bdfdab755d84a450 |
| SHA1 | d7d583c08e82f39637d8209447c2c9cad1478f01 |
| SHA256 | a04e8cc0ea5f7e143eba012c2bc470161f1faf9c904eb233f777ced8e6e706ad |
| SHA512 | 0f60de7622aa69ae0b209a1ed54ec7ba0f6b81b597565e64d41845bec8c471a768ca8622964260c448530f637492aac31a4fc5ec95de147ef2c0d89149c2a66f |
Analysis: behavioral2
Detonation Overview
Submitted
2023-10-18 12:07
Reported
2023-10-18 12:11
Platform
win10v2004-20230915-en
Max time kernel
200s
Max time network
205s
Command Line
Signatures
Azov
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bandera = "C:\\ProgramData\\rdpclient.exe" | C:\Users\Admin\AppData\Local\Temp\0d654bd41f1aa5790624656e942f317e5984d139a3f17cb6f167544d713609a8.exe | N/A |
Enumerates connected drives
Drops file in Program Files directory
Processes
C:\Users\Admin\AppData\Local\Temp\0d654bd41f1aa5790624656e942f317e5984d139a3f17cb6f167544d713609a8.exe
"C:\Users\Admin\AppData\Local\Temp\0d654bd41f1aa5790624656e942f317e5984d139a3f17cb6f167544d713609a8.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 146.78.124.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 126.24.238.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.81.21.72.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 108.211.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 208.194.73.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 49.192.11.51.in-addr.arpa | udp |
Files
memory/876-0-0x0000000002740000-0x0000000002746000-memory.dmp
memory/876-1-0x0000000002770000-0x0000000002774000-memory.dmp
memory/876-2-0x0000000002760000-0x0000000002765000-memory.dmp
memory/876-4-0x00007FF7BE250000-0x00007FF7BE274000-memory.dmp
memory/876-6-0x0000000002770000-0x0000000002774000-memory.dmp
memory/876-7-0x0000000002760000-0x0000000002765000-memory.dmp
memory/876-8-0x0000000002760000-0x0000000002765000-memory.dmp