Analysis
-
max time kernel
96s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2025, 11:39
Static task
static1
Behavioral task
behavioral1
Sample
42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe
Resource
win10v2004-20250217-en
General
-
Target
42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe
-
Size
1.5MB
-
MD5
05a7cd4fc219f4460fb0484b13c76dd7
-
SHA1
19cb5db410b19153e6430e801c1531fb2e1e6348
-
SHA256
42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2
-
SHA512
c9951795e0f074a9834932fb7a73738ef67ccc5592a668dd112aad477aa1f9036536e1d5570ff6018f96235acee23010eb8565044a2fa622e8106dccf5b31b41
-
SSDEEP
24576:jBjY6kG7lqfbT+/tpdriEUVoZJoAOM08/85RkptVIJqAkfRY:lafby/HrHOMjUfkptVxDY
Malware Config
Signatures
-
Azov
A wiper seeking only damage, first seen in 2022.
-
Azov family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bandera = "C:\\ProgramData\\rdpclient.exe" 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe File opened (read-only) \??\M: 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe File opened (read-only) \??\X: 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe File opened (read-only) \??\Y: 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe File opened (read-only) \??\Z: 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe File opened (read-only) \??\A: 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe File opened (read-only) \??\G: 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe File opened (read-only) \??\I: 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe File opened (read-only) \??\J: 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe File opened (read-only) \??\Q: 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe File opened (read-only) \??\R: 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe File opened (read-only) \??\T: 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe File opened (read-only) \??\V: 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe File opened (read-only) \??\E: 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe File opened (read-only) \??\K: 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe File opened (read-only) \??\O: 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe File opened (read-only) \??\S: 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe File opened (read-only) \??\H: 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe File opened (read-only) \??\L: 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe File opened (read-only) \??\N: 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe File opened (read-only) \??\P: 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe File opened (read-only) \??\U: 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe File opened (read-only) \??\W: 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7-zip.chm 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe File created C:\Program Files\7-Zip\RESTORE_FILES.txt 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe File opened for modification C:\Program Files\7-Zip\7z.sfx 42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe"C:\Users\Admin\AppData\Local\Temp\42cdb395ee0939852ab526abcd41050147e631064accf82aee04b755a7b11db2.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
PID:4620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD52b8eb5501eebea08f5e3d6b96cc87cca
SHA18f0c135665fbbcccc1d9329f94d71bdd95b1efad
SHA25681a56cf98fe61ad92c350fc63acb842946791e50832387bed00209772e23baa3
SHA51248b7b9d1664c70ac9b39d1da70f88d342e33cc09fafa922e40626245e31d9e6ee0846ccf579dc7b27817cbcd42d10c97910b387e1e17e11d59dcdc3862f28161