Analysis Overview
SHA256
05815418cfc42049037a3aee0cab64353d01bb2003b88faf7a89258b40d6b3b9
Threat Level: Known bad
The file d610608364afbb4dcfd94365f718c65d was found to be: Known bad.
Malicious Activity Summary
Azov
Adds Run key to start application
Enumerates connected drives
Unsigned PE
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2023-10-18 12:08
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2023-10-18 12:08
Reported
2023-10-18 12:13
Platform
win10v2004-20230915-en
Max time kernel
150s
Max time network
164s
Command Line
Signatures
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bandera = "C:\\ProgramData\\rdpclient.exe" | C:\Users\Admin\AppData\Local\Temp\d610608364afbb4dcfd94365f718c65d.exe | N/A |
Enumerates connected drives
Processes
C:\Users\Admin\AppData\Local\Temp\d610608364afbb4dcfd94365f718c65d.exe
"C:\Users\Admin\AppData\Local\Temp\d610608364afbb4dcfd94365f718c65d.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 59.128.231.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 208.194.73.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 146.78.124.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 126.24.238.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 1.202.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.73.42.20.in-addr.arpa | udp |
Files
memory/4744-0-0x0000023CE4310000-0x0000023CE4314000-memory.dmp
memory/4744-1-0x0000023CE42D0000-0x0000023CE42D7000-memory.dmp
memory/4744-3-0x0000023CE42F0000-0x0000023CE42F5000-memory.dmp
memory/4744-4-0x00007FF7F4DF0000-0x00007FF7F4E92000-memory.dmp
memory/4744-6-0x0000023CE4310000-0x0000023CE4314000-memory.dmp
memory/4744-10-0x0000023CE42F0000-0x0000023CE42F5000-memory.dmp
memory/4744-14-0x0000023CE42F0000-0x0000023CE42F5000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2023-10-18 12:08
Reported
2023-10-18 12:13
Platform
win7-20230831-en
Max time kernel
118s
Max time network
130s
Command Line
Signatures
Azov
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bandera = "C:\\ProgramData\\rdpclient.exe" | C:\Users\Admin\AppData\Local\Temp\d610608364afbb4dcfd94365f718c65d.exe | N/A |
Enumerates connected drives
Processes
C:\Users\Admin\AppData\Local\Temp\d610608364afbb4dcfd94365f718c65d.exe
"C:\Users\Admin\AppData\Local\Temp\d610608364afbb4dcfd94365f718c65d.exe"
Network
Files
memory/2416-3-0x0000000000380000-0x0000000000385000-memory.dmp
memory/2416-6-0x0000000001AD0000-0x0000000001AD4000-memory.dmp
memory/2416-4-0x000000013F0E0000-0x000000013F182000-memory.dmp
memory/2416-1-0x0000000001AD0000-0x0000000001AD4000-memory.dmp
memory/2416-0-0x0000000000150000-0x0000000000157000-memory.dmp
memory/2416-11-0x0000000000380000-0x0000000000385000-memory.dmp
memory/2416-14-0x0000000000380000-0x0000000000385000-memory.dmp