Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 07:29
Behavioral task
behavioral1
Sample
file_recovery.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
file_recovery.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20240709-en
General
-
Target
file_recovery.exe
-
Size
268KB
-
MD5
acc87c6705f56fbe192b263edb237d1e
-
SHA1
5b68b8542a3980ce4b4ec9d687546701c4bc2b53
-
SHA256
694d17ed2b2c44be9d116323c7f595ae82ba33e2257debebc59c81ba33eea70f
-
SHA512
f15f273e94d6f294268b5f1ce65100e50d4e9680942433e515224e19aaf8143799c0c00c4250fd5e55f9e384af41524a62a0f677803c147b2248aff36f951e04
-
SSDEEP
6144:4xidTKuNV6cW5kEpZmLQAHi/BdXZX9eweBovQm12KKLx14HfL6f:4xn6hAfzjAo8ovB12L1+L
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\a: file_recovery.exe File opened (read-only) \??\e: file_recovery.exe File opened (read-only) \??\g: file_recovery.exe File opened (read-only) \??\b: file_recovery.exe File opened (read-only) \??\i: file_recovery.exe File opened (read-only) \??\j: file_recovery.exe File opened (read-only) \??\p: file_recovery.exe File opened (read-only) \??\r: file_recovery.exe File opened (read-only) \??\s: file_recovery.exe File opened (read-only) \??\w: file_recovery.exe File opened (read-only) \??\k: file_recovery.exe File opened (read-only) \??\m: file_recovery.exe File opened (read-only) \??\q: file_recovery.exe File opened (read-only) \??\t: file_recovery.exe File opened (read-only) \??\x: file_recovery.exe File opened (read-only) \??\z: file_recovery.exe File opened (read-only) \??\h: file_recovery.exe File opened (read-only) \??\l: file_recovery.exe File opened (read-only) \??\n: file_recovery.exe File opened (read-only) \??\o: file_recovery.exe File opened (read-only) \??\u: file_recovery.exe File opened (read-only) \??\v: file_recovery.exe File opened (read-only) \??\y: file_recovery.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).