Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 02:43
Static task
static1
Behavioral task
behavioral1
Sample
c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe
Resource
win10v2004-20240412-en
General
-
Target
c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe
-
Size
209KB
-
MD5
b1df1c9592f82fec08bc3114ce1ebfe3
-
SHA1
c167b5539586af0fac0ee0db0011f29275ad2417
-
SHA256
c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963
-
SHA512
7a3ff8769dc2d8944f9d2cbea7e6d34d65b8f82b7085e4d1a5747acb6ab680458161d32fdfe039fc2310d996b2284a2a02d7a2716c4d7e7132b9ba0e1cd37701
-
SSDEEP
1536:2wqlEbWxNcgi6BHbWy//5SnTkj0qs6/rld73n+ipRx9bU5y:qlugim7WQxSo0qVl13+iXwg
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 17 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\V: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\E: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\K: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\T: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\N: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\O: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\P: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\H: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\J: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\M: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\I: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\Q: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\S: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\G: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\L: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe File opened (read-only) \??\R: c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BFWorkFile1007PV c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BFWorkFile1007PV\EFile = "051036068052045077085059048044107114070066082115149163153045000081071139056035090155065028233028145237215204141194055195144162222074213037099237172216195137019" c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BFWorkFile1007PV\DFile c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1056 c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe"C:\Users\Admin\AppData\Local\Temp\c45fae5ce75c7a0d46da493911833d99b07059513a6787f12031bd10db273963.exe"1⤵
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1056