Analysis
-
max time kernel
15s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 00:29
Static task
static1
Behavioral task
behavioral1
Sample
6a6b98ec385b6481e1cbba5d7ad70980N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6a6b98ec385b6481e1cbba5d7ad70980N.exe
Resource
win10v2004-20240802-en
General
-
Target
6a6b98ec385b6481e1cbba5d7ad70980N.exe
-
Size
3.6MB
-
MD5
6a6b98ec385b6481e1cbba5d7ad70980
-
SHA1
41877f3af028a0ff668500878ac5636e2cd45177
-
SHA256
d8de7883364b25260efef81e4ade09637aa4d8d8e03f8d288694759a29ab7c38
-
SHA512
4681cb5f73057fc06a9b56368588e9bdd57d51666877ef1af58c4096a857fc81bc6741a0b3644ce51be307aceb970e21a829d57c2fdb34e82623fca942614426
-
SSDEEP
49152:qz+Zn2TAyHzztmLFEuVebedv9uNBb8AfLK9qrO1LS9RhSq15vTNuHv/QXd9CQxM9:kWFk/fSqrOiOc53I
Malware Config
Signatures
-
Azov
A wiper seeking only damage, first seen in 2022.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bandera = "C:\\ProgramData\\rdpclient.exe" 6a6b98ec385b6481e1cbba5d7ad70980N.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: 6a6b98ec385b6481e1cbba5d7ad70980N.exe File opened (read-only) \??\B: 6a6b98ec385b6481e1cbba5d7ad70980N.exe File opened (read-only) \??\E: 6a6b98ec385b6481e1cbba5d7ad70980N.exe File opened (read-only) \??\K: 6a6b98ec385b6481e1cbba5d7ad70980N.exe File opened (read-only) \??\N: 6a6b98ec385b6481e1cbba5d7ad70980N.exe File opened (read-only) \??\O: 6a6b98ec385b6481e1cbba5d7ad70980N.exe File opened (read-only) \??\G: 6a6b98ec385b6481e1cbba5d7ad70980N.exe File opened (read-only) \??\H: 6a6b98ec385b6481e1cbba5d7ad70980N.exe File opened (read-only) \??\S: 6a6b98ec385b6481e1cbba5d7ad70980N.exe File opened (read-only) \??\V: 6a6b98ec385b6481e1cbba5d7ad70980N.exe File opened (read-only) \??\W: 6a6b98ec385b6481e1cbba5d7ad70980N.exe File opened (read-only) \??\U: 6a6b98ec385b6481e1cbba5d7ad70980N.exe File opened (read-only) \??\A: 6a6b98ec385b6481e1cbba5d7ad70980N.exe File opened (read-only) \??\I: 6a6b98ec385b6481e1cbba5d7ad70980N.exe File opened (read-only) \??\M: 6a6b98ec385b6481e1cbba5d7ad70980N.exe File opened (read-only) \??\Q: 6a6b98ec385b6481e1cbba5d7ad70980N.exe File opened (read-only) \??\T: 6a6b98ec385b6481e1cbba5d7ad70980N.exe File opened (read-only) \??\Z: 6a6b98ec385b6481e1cbba5d7ad70980N.exe File opened (read-only) \??\J: 6a6b98ec385b6481e1cbba5d7ad70980N.exe File opened (read-only) \??\L: 6a6b98ec385b6481e1cbba5d7ad70980N.exe File opened (read-only) \??\P: 6a6b98ec385b6481e1cbba5d7ad70980N.exe File opened (read-only) \??\R: 6a6b98ec385b6481e1cbba5d7ad70980N.exe File opened (read-only) \??\Y: 6a6b98ec385b6481e1cbba5d7ad70980N.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7z.exe 6a6b98ec385b6481e1cbba5d7ad70980N.exe File opened for modification C:\Program Files\7-Zip\7-zip.chm 6a6b98ec385b6481e1cbba5d7ad70980N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2468 2304 6a6b98ec385b6481e1cbba5d7ad70980N.exe 29 PID 2304 wrote to memory of 2468 2304 6a6b98ec385b6481e1cbba5d7ad70980N.exe 29 PID 2304 wrote to memory of 2468 2304 6a6b98ec385b6481e1cbba5d7ad70980N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a6b98ec385b6481e1cbba5d7ad70980N.exe"C:\Users\Admin\AppData\Local\Temp\6a6b98ec385b6481e1cbba5d7ad70980N.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2304 -s 1362⤵PID:2468
-