Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 10:29
Static task
static1
Behavioral task
behavioral1
Sample
c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9.exe
Resource
win10v2004-20240508-en
General
-
Target
c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9.exe
-
Size
1.2MB
-
MD5
87d551468ca92a5e9d36f7d3c49f69e3
-
SHA1
ffc1e3e34712ca72a6e9e93ce80927065721c8e8
-
SHA256
c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9
-
SHA512
148c4dd0aef91c540c1f66ee4c7d4787633302529a9e72a03986847c6c0fb1eac96fe0d5459e035ffdfdf2e7745800af9628caa57f04c6d5a71b20abbff50ac9
-
SSDEEP
24576:++i6FnRpDuf+WmrNAamK5gKo2FKOGXA90CyM4OR8jIxAGfA9:+0Fnbu2WmrNl5gQFHSA4Md7/Y9
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9.exe File opened (read-only) \??\W: c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9.exe File opened (read-only) \??\Z: c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9.exe File opened (read-only) \??\K: c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9.exe File opened (read-only) \??\P: c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9.exe File opened (read-only) \??\Q: c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9.exe File opened (read-only) \??\G: c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9.exe File opened (read-only) \??\I: c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9.exe File opened (read-only) \??\M: c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9.exe File opened (read-only) \??\N: c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9.exe File opened (read-only) \??\O: c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9.exe File opened (read-only) \??\A: c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9.exe File opened (read-only) \??\B: c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9.exe File opened (read-only) \??\E: c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9.exe File opened (read-only) \??\S: c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9.exe File opened (read-only) \??\R: c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9.exe File opened (read-only) \??\T: c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9.exe File opened (read-only) \??\V: c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9.exe File opened (read-only) \??\X: c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9.exe File opened (read-only) \??\Y: c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9.exe File opened (read-only) \??\H: c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9.exe File opened (read-only) \??\J: c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9.exe File opened (read-only) \??\L: c1375aabcb3fd55444035a4cc165f73ab69e1e64cd76f1f527b6feeb4110beb9.exe