Analysis
-
max time kernel
95s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 01:03
Static task
static1
Behavioral task
behavioral1
Sample
3a54bc3a76331908e701b977a1eed6eb.exe
Resource
win10v2004-20240802-en
General
-
Target
3a54bc3a76331908e701b977a1eed6eb.exe
-
Size
112KB
-
MD5
3a54bc3a76331908e701b977a1eed6eb
-
SHA1
c48940b4eb92c7391fe3091ca4cca300b09117fb
-
SHA256
c95ab5b6008be69eeb3f8022d8ce6934a7676ff4535a27b7f1be890c25868145
-
SHA512
23fbac1e21648722d963348303491bce8ca12623c6aacf25ce0de4d5b8ec07b09ca58701ed53f1a5d267c8eb133c95e37feb05d30320aca456c92034c0e2a3fb
-
SSDEEP
3072:ll4DEGYx6KAMrHTx4rd60njnXN+KUpVkJB3rxyM/mhSd:ll4DElxgf6WjsKbehe
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\RESTORE_FILES.txt
azov
Signatures
-
Azov
A wiper seeking only damage, first seen in 2022.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
3a54bc3a76331908e701b977a1eed6eb.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bandera = "C:\\ProgramData\\rdpclient.exe" 3a54bc3a76331908e701b977a1eed6eb.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
3a54bc3a76331908e701b977a1eed6eb.exedescription ioc process File opened (read-only) \??\S: 3a54bc3a76331908e701b977a1eed6eb.exe File opened (read-only) \??\U: 3a54bc3a76331908e701b977a1eed6eb.exe File opened (read-only) \??\Z: 3a54bc3a76331908e701b977a1eed6eb.exe File opened (read-only) \??\G: 3a54bc3a76331908e701b977a1eed6eb.exe File opened (read-only) \??\H: 3a54bc3a76331908e701b977a1eed6eb.exe File opened (read-only) \??\M: 3a54bc3a76331908e701b977a1eed6eb.exe File opened (read-only) \??\O: 3a54bc3a76331908e701b977a1eed6eb.exe File opened (read-only) \??\P: 3a54bc3a76331908e701b977a1eed6eb.exe File opened (read-only) \??\Y: 3a54bc3a76331908e701b977a1eed6eb.exe File opened (read-only) \??\A: 3a54bc3a76331908e701b977a1eed6eb.exe File opened (read-only) \??\E: 3a54bc3a76331908e701b977a1eed6eb.exe File opened (read-only) \??\I: 3a54bc3a76331908e701b977a1eed6eb.exe File opened (read-only) \??\K: 3a54bc3a76331908e701b977a1eed6eb.exe File opened (read-only) \??\W: 3a54bc3a76331908e701b977a1eed6eb.exe File opened (read-only) \??\T: 3a54bc3a76331908e701b977a1eed6eb.exe File opened (read-only) \??\X: 3a54bc3a76331908e701b977a1eed6eb.exe File opened (read-only) \??\B: 3a54bc3a76331908e701b977a1eed6eb.exe File opened (read-only) \??\J: 3a54bc3a76331908e701b977a1eed6eb.exe File opened (read-only) \??\L: 3a54bc3a76331908e701b977a1eed6eb.exe File opened (read-only) \??\Q: 3a54bc3a76331908e701b977a1eed6eb.exe File opened (read-only) \??\R: 3a54bc3a76331908e701b977a1eed6eb.exe File opened (read-only) \??\N: 3a54bc3a76331908e701b977a1eed6eb.exe File opened (read-only) \??\V: 3a54bc3a76331908e701b977a1eed6eb.exe -
Drops file in Program Files directory 64 IoCs
Processes:
3a54bc3a76331908e701b977a1eed6eb.exedescription ioc process File opened for modification C:\Program Files\7-Zip\7z.exe 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\meta-index 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\lyncicon.exe 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\mesa3d.md 3a54bc3a76331908e701b977a1eed6eb.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\RESTORE_FILES.txt 3a54bc3a76331908e701b977a1eed6eb.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\RESTORE_FILES.txt 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Common Files\System\msadc\adcvbs.inc 3a54bc3a76331908e701b977a1eed6eb.exe File created C:\Program Files\Common Files\System\msadc\es-ES\RESTORE_FILES.txt 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\sqloledb.rll.mui 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\ext\localedata.jar 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\deploy\messages_es.properties 3a54bc3a76331908e701b977a1eed6eb.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\RESTORE_FILES.txt 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\sqlxmlx.rll 3a54bc3a76331908e701b977a1eed6eb.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pl\RESTORE_FILES.txt 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Java\jdk-1.8\COPYRIGHT 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmpconfig.exe 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Java\jdk-1.8\jvisualvm.txt 3a54bc3a76331908e701b977a1eed6eb.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\RESTORE_FILES.txt 3a54bc3a76331908e701b977a1eed6eb.exe File created C:\Program Files\Common Files\microsoft shared\ink\nb-NO\RESTORE_FILES.txt 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\ur.pak 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\jsse.jar 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\javafx\gstreamer.md 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\cldr.md 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\Alphabet.xml 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\.version 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\security\cacerts 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\jdk\jpeg.md 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\i640.cab.cat 3a54bc3a76331908e701b977a1eed6eb.exe File created C:\Program Files\Common Files\microsoft shared\ink\sk-SK\RESTORE_FILES.txt 3a54bc3a76331908e701b977a1eed6eb.exe File created C:\Program Files\Common Files\microsoft shared\ink\zh-TW\RESTORE_FILES.txt 3a54bc3a76331908e701b977a1eed6eb.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hant\RESTORE_FILES.txt 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxCalendarAppImm.exe 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\deploy\messages.properties 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\javafx\icu_web.md 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\security\javaws.policy 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base.xml 3a54bc3a76331908e701b977a1eed6eb.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\RESTORE_FILES.txt 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols.xml 3a54bc3a76331908e701b977a1eed6eb.exe File created C:\Program Files\Common Files\System\RESTORE_FILES.txt 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad.xml 3a54bc3a76331908e701b977a1eed6eb.exe File created C:\Program Files\Common Files\microsoft shared\ink\zh-CN\RESTORE_FILES.txt 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\ext\cldrdata.jar 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\relaxngom.md 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipssve.xml 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Common Files\System\ado\msado25.tlb 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\filecompare.exe 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\VisualElements\SmallLogo.png 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Internet Explorer\images\bing.ico 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hwrusash.dat 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Windows Media Player\wmprph.exe 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\pipanel.exe 3a54bc3a76331908e701b977a1eed6eb.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\win32\jawt_md.h 3a54bc3a76331908e701b977a1eed6eb.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD54f3332a48d767cc5bdfdab755d84a450
SHA1d7d583c08e82f39637d8209447c2c9cad1478f01
SHA256a04e8cc0ea5f7e143eba012c2bc470161f1faf9c904eb233f777ced8e6e706ad
SHA5120f60de7622aa69ae0b209a1ed54ec7ba0f6b81b597565e64d41845bec8c471a768ca8622964260c448530f637492aac31a4fc5ec95de147ef2c0d89149c2a66f