Analysis
-
max time kernel
142s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2023 12:08
Static task
static1
Behavioral task
behavioral1
Sample
c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe
Resource
win10v2004-20230915-en
General
-
Target
c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe
-
Size
182KB
-
MD5
17db54b724866a8c9a5abb84d023c247
-
SHA1
a1bae693925a9bab2c642bb1bc560f7efa9e4225
-
SHA256
c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6
-
SHA512
9900b6e487873fab3054f763cc597b49f497083fcdfd01c7e05a2f36497e11ac31057e1d365d2304a09987db0ef2d8f6bfd1b4ca56aa992d0ebe5dc0d9cc1dce
-
SSDEEP
3072:3TO4rVlSkm5XMLWKMdZEU39gGioLdmQp3HODe0emkcxMWnThZAs:dlPqXUWv3Es9VhmQp+6GBdZT
Malware Config
Signatures
-
Azov
A wiper seeking only damage, first seen in 2022.
-
Renames multiple (138) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bandera = "C:\\ProgramData\\rdpclient.exe" c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exedescription ioc process File opened (read-only) \??\V: c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened (read-only) \??\B: c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened (read-only) \??\L: c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened (read-only) \??\O: c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened (read-only) \??\K: c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened (read-only) \??\M: c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened (read-only) \??\R: c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened (read-only) \??\S: c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened (read-only) \??\T: c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened (read-only) \??\E: c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened (read-only) \??\H: c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened (read-only) \??\I: c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened (read-only) \??\U: c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened (read-only) \??\W: c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened (read-only) \??\Z: c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened (read-only) \??\Y: c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened (read-only) \??\A: c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened (read-only) \??\J: c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened (read-only) \??\N: c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened (read-only) \??\X: c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened (read-only) \??\G: c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened (read-only) \??\P: c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened (read-only) \??\Q: c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe -
Drops file in Program Files directory 64 IoCs
Processes:
c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exedescription ioc process File opened for modification C:\Program Files\7-Zip\Lang\ext.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\auxbase.xml c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File created C:\Program Files\Common Files\System\it-IT\RESTORE_FILES.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\ApproveClear.DVR c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\RESTORE_FILES.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipstr.xml c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\7-Zip\7z.exe c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\i640.hash c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu.xml c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Common Files\System\ado\msado20.tlb c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_100_percent.pak c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File created C:\Program Files\Common Files\microsoft shared\ink\he-IL\RESTORE_FILES.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsrus.xml c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jabswitch.exe c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_rtl.xml c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsesp.xml c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsita.xml c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File created C:\Program Files\Common Files\System\Ole DB\es-ES\RESTORE_FILES.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File created C:\Program Files\Common Files\microsoft shared\ink\zh-CN\RESTORE_FILES.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File created C:\Program Files\Common Files\microsoft shared\VC\RESTORE_FILES.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\vstoee90.tlb c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Common Files\System\ado\adovbs.inc c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File created C:\Program Files\Common Files\System\es-ES\RESTORE_FILES.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File created C:\Program Files\7-Zip\RESTORE_FILES.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File created C:\Program Files\Common Files\microsoft shared\ink\zh-TW\RESTORE_FILES.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File created C:\Program Files\Common Files\System\msadc\fr-FR\RESTORE_FILES.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsjpn.xml c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\oledbjvs.inc c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\ExpandReceive.vstx c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\7-Zip\7zG.exe c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\ExpandProtect.rmi c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jrunscript.exe c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\external_extensions.json c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\RESTORE_FILES.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad.xml c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\extcheck.exe c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\7-Zip\readme.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsen.xml c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File created C:\Program Files\Common Files\System\ado\de-DE\RESTORE_FILES.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Common Files\Services\verisign.bmp c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File created C:\Program Files\Common Files\System\ado\it-IT\RESTORE_FILES.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RHeartbeatConfig.xml c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\RESTORE_FILES.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Common Files\System\msadc\adcvbs.inc c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javac.exe c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File created C:\Program Files\Common Files\System\msadc\de-DE\RESTORE_FILES.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe"C:\Users\Admin\AppData\Local\Temp\c7073357c5cfe55454b74ee5a2c8fd05e22e0ee9f6264db7df4490af543274a6.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
PID:5080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD578ede93114e65f9160fd03d3357c56e6
SHA188d531b101e57655f1d0d26c6b3257aa2468d460
SHA256c97412fbf88da8f91099a52888dea4c3f222cd95af3e681e3271cbca8b6b7bb5
SHA512074a4c741273902ccacb6f573b96d8accedb2ee405dbd04350cdbf54d180c1fd577a4e90c2aae26bf72f3782403f4494db6e3501a04cfd9d7d81a6bc14884b9d