Analysis
-
max time kernel
514s -
max time network
594s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2023 09:31
Static task
static1
Behavioral task
behavioral1
Sample
GoogleUpdate.exe
Resource
win10-20231215-en
Behavioral task
behavioral2
Sample
GoogleUpdate.exe
Resource
win10v2004-20231215-en
General
-
Target
GoogleUpdate.exe
-
Size
424KB
-
MD5
36d72b6f04b592df6dec04c33f6eda75
-
SHA1
d7ade5c96fb08f1a1e38e50c156eb239e50a8179
-
SHA256
4ca12f17e8805b363edf6d0a6f3cf912279b7e07f34f75c876dbe7c949b3ca78
-
SHA512
22526406e5fed7d12116d4d72e8d9179f16b218e03912d697ddb8e1b5e5e8ebf56809ec6b949322c950484547ef09b67148d244b437fdaf6675bf984488ae61e
-
SSDEEP
12288:prGWllq2p48m/K/NNomwoGr3qax+rZcpAv2obl1:paKlqy48my/NNHfGr3txMypAv3bl1
Malware Config
Extracted
C:\Program Files\7-Zip\RESTORE_FILES.txt
azov
Signatures
-
Azov
A wiper seeking only damage, first seen in 2022.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
GoogleUpdate.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bandera = "C:\\ProgramData\\rdpclient.exe" GoogleUpdate.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
GoogleUpdate.exedescription ioc process File opened (read-only) \??\B: GoogleUpdate.exe File opened (read-only) \??\K: GoogleUpdate.exe File opened (read-only) \??\R: GoogleUpdate.exe File opened (read-only) \??\V: GoogleUpdate.exe File opened (read-only) \??\G: GoogleUpdate.exe File opened (read-only) \??\J: GoogleUpdate.exe File opened (read-only) \??\M: GoogleUpdate.exe File opened (read-only) \??\O: GoogleUpdate.exe File opened (read-only) \??\Z: GoogleUpdate.exe File opened (read-only) \??\T: GoogleUpdate.exe File opened (read-only) \??\U: GoogleUpdate.exe File opened (read-only) \??\X: GoogleUpdate.exe File opened (read-only) \??\H: GoogleUpdate.exe File opened (read-only) \??\I: GoogleUpdate.exe File opened (read-only) \??\L: GoogleUpdate.exe File opened (read-only) \??\Q: GoogleUpdate.exe File opened (read-only) \??\S: GoogleUpdate.exe File opened (read-only) \??\Y: GoogleUpdate.exe File opened (read-only) \??\A: GoogleUpdate.exe File opened (read-only) \??\E: GoogleUpdate.exe File opened (read-only) \??\N: GoogleUpdate.exe File opened (read-only) \??\P: GoogleUpdate.exe File opened (read-only) \??\W: GoogleUpdate.exe -
Drops file in Program Files directory 6 IoCs
Processes:
GoogleUpdate.exedescription ioc process File opened for modification C:\Program Files\7-Zip\7z.sfx GoogleUpdate.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx GoogleUpdate.exe File opened for modification C:\Program Files\7-Zip\descript.ion GoogleUpdate.exe File opened for modification C:\Program Files\7-Zip\History.txt GoogleUpdate.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm GoogleUpdate.exe File created C:\Program Files\7-Zip\RESTORE_FILES.txt GoogleUpdate.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD54f3332a48d767cc5bdfdab755d84a450
SHA1d7d583c08e82f39637d8209447c2c9cad1478f01
SHA256a04e8cc0ea5f7e143eba012c2bc470161f1faf9c904eb233f777ced8e6e706ad
SHA5120f60de7622aa69ae0b209a1ed54ec7ba0f6b81b597565e64d41845bec8c471a768ca8622964260c448530f637492aac31a4fc5ec95de147ef2c0d89149c2a66f