Analysis
-
max time kernel
133s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
15/11/2023, 13:16
Behavioral task
behavioral1
Sample
80e91eeb23bcb49abfd52cf2d75a6d64b7af1c4878bda0f6e45d63ce332e21e9.exe
Resource
win7-20231020-en
5 signatures
150 seconds
General
-
Target
80e91eeb23bcb49abfd52cf2d75a6d64b7af1c4878bda0f6e45d63ce332e21e9.exe
-
Size
12.8MB
-
MD5
6bfba334f7ba9f1672af181fae5f2d39
-
SHA1
e448110457f9fcf1ad1763517b8babebc056f1ce
-
SHA256
80e91eeb23bcb49abfd52cf2d75a6d64b7af1c4878bda0f6e45d63ce332e21e9
-
SHA512
6783c24beb769d16c5f8db0e650914fc6e4e5a704e3be38355d08170565cb66d67fabee6edfa98ab9b0c7aea03c99d90e0d257ec3ac7fec29d658c8460cbb691
-
SSDEEP
393216:6eOkwQ+Pd/I/q7ngIHP9PvOp/95NK7sF8S:MbQ2CyDgU1s/Tk72B
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1404-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1404-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1404-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1404-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1404-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1404-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1404-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1404-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1404-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1404-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1404-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1404-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1404-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1404-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1404-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1404-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1404-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1404-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1404-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1404-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1404-53-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1404-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1404-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1404-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1404-63-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1404-61-0x0000000003E80000-0x0000000003EA6000-memory.dmp upx behavioral2/memory/1404-62-0x0000000003EE0000-0x0000000003F06000-memory.dmp upx behavioral2/memory/1404-64-0x0000000003EE0000-0x0000000003F06000-memory.dmp upx behavioral2/memory/1404-67-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1404-68-0x0000000003E80000-0x0000000003EA6000-memory.dmp upx behavioral2/memory/1404-69-0x0000000003EE0000-0x0000000003F06000-memory.dmp upx -
resource yara_rule behavioral2/memory/1404-0-0x0000000000400000-0x0000000001E39000-memory.dmp vmprotect behavioral2/memory/1404-34-0x0000000000400000-0x0000000001E39000-memory.dmp vmprotect -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 80e91eeb23bcb49abfd52cf2d75a6d64b7af1c4878bda0f6e45d63ce332e21e9.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1404 80e91eeb23bcb49abfd52cf2d75a6d64b7af1c4878bda0f6e45d63ce332e21e9.exe 1404 80e91eeb23bcb49abfd52cf2d75a6d64b7af1c4878bda0f6e45d63ce332e21e9.exe 1404 80e91eeb23bcb49abfd52cf2d75a6d64b7af1c4878bda0f6e45d63ce332e21e9.exe 1404 80e91eeb23bcb49abfd52cf2d75a6d64b7af1c4878bda0f6e45d63ce332e21e9.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1404 80e91eeb23bcb49abfd52cf2d75a6d64b7af1c4878bda0f6e45d63ce332e21e9.exe 1404 80e91eeb23bcb49abfd52cf2d75a6d64b7af1c4878bda0f6e45d63ce332e21e9.exe 1404 80e91eeb23bcb49abfd52cf2d75a6d64b7af1c4878bda0f6e45d63ce332e21e9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80e91eeb23bcb49abfd52cf2d75a6d64b7af1c4878bda0f6e45d63ce332e21e9.exe"C:\Users\Admin\AppData\Local\Temp\80e91eeb23bcb49abfd52cf2d75a6d64b7af1c4878bda0f6e45d63ce332e21e9.exe"1⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1404