Analysis
-
max time kernel
141s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 23:42
Behavioral task
behavioral1
Sample
Everything.exe
Resource
win7-20240508-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
Everything.exe
Resource
win10v2004-20240426-en
3 signatures
150 seconds
General
-
Target
Everything.exe
-
Size
742KB
-
MD5
6d17086cf024a56e2b6a46e3333174c0
-
SHA1
86f67f8a4afc6ac9c0b65968343dff84b3d2b90b
-
SHA256
9c44f6a5e8bac744fff62e279b5b5596b0e42357ab1e21572beb467302b8c2ba
-
SHA512
2f956ff17a8d7ab4eb50c6b3b216f5600d1f4edb68716ce1240e7ad18bee0f0949a7c44ee12eb6f1213f979ae94a105d03fb33a52ba0645a5cd08ca7ee815608
-
SSDEEP
12288:eu6Sw/Emm5p/U5nXemM2kzCejIM6AkHxm+BP/Qt6bcYcp4wG96vpfgj94hX3Epus:eFc5/eXemMTZ6AUxhXe6bTf6Ngj9kEXz
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1044-0-0x00007FF7917B0000-0x00007FF7919E6000-memory.dmp upx behavioral2/memory/1044-1-0x00007FF7917B0000-0x00007FF7919E6000-memory.dmp upx behavioral2/memory/1044-6-0x00007FF7917B0000-0x00007FF7919E6000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: Everything.exe File opened (read-only) \??\L: Everything.exe File opened (read-only) \??\O: Everything.exe File opened (read-only) \??\G: Everything.exe File opened (read-only) \??\I: Everything.exe File opened (read-only) \??\M: Everything.exe File opened (read-only) \??\N: Everything.exe File opened (read-only) \??\P: Everything.exe File opened (read-only) \??\Q: Everything.exe File opened (read-only) \??\B: Everything.exe File opened (read-only) \??\E: Everything.exe File opened (read-only) \??\V: Everything.exe File opened (read-only) \??\X: Everything.exe File opened (read-only) \??\Z: Everything.exe File opened (read-only) \??\S: Everything.exe File opened (read-only) \??\U: Everything.exe File opened (read-only) \??\Y: Everything.exe File opened (read-only) \??\J: Everything.exe File opened (read-only) \??\K: Everything.exe File opened (read-only) \??\R: Everything.exe File opened (read-only) \??\W: Everything.exe File opened (read-only) \??\A: Everything.exe File opened (read-only) \??\H: Everything.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1044 Everything.exe