Analysis
-
max time kernel
0s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 23:58
Static task
static1
Behavioral task
behavioral1
Sample
20d775ac9508cbbd056af894b0c41f07.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20d775ac9508cbbd056af894b0c41f07.exe
Resource
win10v2004-20231215-en
General
-
Target
20d775ac9508cbbd056af894b0c41f07.exe
-
Size
773KB
-
MD5
20d775ac9508cbbd056af894b0c41f07
-
SHA1
358ce65a14c7f4f52a56135e736a1848e3abb0af
-
SHA256
101f54b00223a7b66b7d9d91bd0d05fccb5359e76010e39fe5a610aa38f0283c
-
SHA512
2b80a3d6fc9e2fa7be750f9e9ebf7389c3113ae6fc54dae1189bdf08ddfdcdee9e87b7df011f734a5e34b4c2308697f67be4a34e01f0a4d71515255ca8a0faa6
-
SSDEEP
12288:b+XrEi7D5N59js6j6tsqzneU0lLmU+7OzVXLJRYCIEE1bh7IUShCUXNqYJ/o3RFY:mfHjst/mlLmyXLv3IEEpJlUdGU
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: 20d775ac9508cbbd056af894b0c41f07.exe File opened (read-only) \??\O: 20d775ac9508cbbd056af894b0c41f07.exe File opened (read-only) \??\Q: 20d775ac9508cbbd056af894b0c41f07.exe File opened (read-only) \??\Z: 20d775ac9508cbbd056af894b0c41f07.exe File opened (read-only) \??\R: 20d775ac9508cbbd056af894b0c41f07.exe File opened (read-only) \??\V: 20d775ac9508cbbd056af894b0c41f07.exe File opened (read-only) \??\W: 20d775ac9508cbbd056af894b0c41f07.exe File opened (read-only) \??\H: 20d775ac9508cbbd056af894b0c41f07.exe File opened (read-only) \??\K: 20d775ac9508cbbd056af894b0c41f07.exe File opened (read-only) \??\L: 20d775ac9508cbbd056af894b0c41f07.exe File opened (read-only) \??\M: 20d775ac9508cbbd056af894b0c41f07.exe File opened (read-only) \??\S: 20d775ac9508cbbd056af894b0c41f07.exe File opened (read-only) \??\T: 20d775ac9508cbbd056af894b0c41f07.exe File opened (read-only) \??\X: 20d775ac9508cbbd056af894b0c41f07.exe File opened (read-only) \??\G: 20d775ac9508cbbd056af894b0c41f07.exe File opened (read-only) \??\I: 20d775ac9508cbbd056af894b0c41f07.exe File opened (read-only) \??\N: 20d775ac9508cbbd056af894b0c41f07.exe File opened (read-only) \??\P: 20d775ac9508cbbd056af894b0c41f07.exe File opened (read-only) \??\E: 20d775ac9508cbbd056af894b0c41f07.exe File opened (read-only) \??\U: 20d775ac9508cbbd056af894b0c41f07.exe File opened (read-only) \??\Y: 20d775ac9508cbbd056af894b0c41f07.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2256 20d775ac9508cbbd056af894b0c41f07.exe