Analysis
-
max time kernel
140s -
max time network
197s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:43
Static task
static1
Behavioral task
behavioral1
Sample
28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe
Resource
win10v2004-20220812-en
General
-
Target
28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe
-
Size
378KB
-
MD5
6b5d08cd9f7a0709f259657bb2b0668d
-
SHA1
9ffd7711f4bf51bdcfd079b06c64ec12c83d4f00
-
SHA256
28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d
-
SHA512
22e04fd86212fec3acf36ddd32690ce80e2ba83be0c16776c72ecbb6ec9081fbd74afa319a2a79307c705ce5f062b84f5b6a97e8ead895c3d14b90c6bac94f2d
-
SSDEEP
3072:gnjFDUYY1tKvF4c7yoke8606093wDwUcpr+dkI2zM5Q:gnj1ItZoke8d9gUrpzkG
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
notepad.exesvchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Zfmjmi = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\Zfmjmi.exe" notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe System Incorporated = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Adobe\\Reader_sl.exe" svchost.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
svchost.exenotepad.exedescription ioc process File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\D: notepad.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\L: svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exedescription pid process target process PID 1352 set thread context of 1480 1352 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 1480 set thread context of 1004 1480 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exesvchost.exe28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exepid process 1352 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 1352 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 760 svchost.exe 1004 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exepid process 1480 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exesvchost.execalc.exenotepad.exedescription pid process Token: SeDebugPrivilege 1004 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe Token: SeDebugPrivilege 760 svchost.exe Token: SeDebugPrivilege 1204 calc.exe Token: SeDebugPrivilege 1676 notepad.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exesvchost.exe28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exedescription pid process target process PID 1352 wrote to memory of 1480 1352 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 1352 wrote to memory of 1480 1352 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 1352 wrote to memory of 1480 1352 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 1352 wrote to memory of 1480 1352 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 1352 wrote to memory of 1480 1352 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 1352 wrote to memory of 1480 1352 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 1352 wrote to memory of 1480 1352 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 1352 wrote to memory of 1480 1352 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 1352 wrote to memory of 1480 1352 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 1352 wrote to memory of 1480 1352 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 1352 wrote to memory of 1480 1352 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 1480 wrote to memory of 1204 1480 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe calc.exe PID 1480 wrote to memory of 760 1480 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe svchost.exe PID 1480 wrote to memory of 760 1480 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe svchost.exe PID 1480 wrote to memory of 1204 1480 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe calc.exe PID 1480 wrote to memory of 760 1480 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe svchost.exe PID 1480 wrote to memory of 1204 1480 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe calc.exe PID 1480 wrote to memory of 760 1480 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe svchost.exe PID 1480 wrote to memory of 1204 1480 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe calc.exe PID 1480 wrote to memory of 1204 1480 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe calc.exe PID 1480 wrote to memory of 1204 1480 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe calc.exe PID 1480 wrote to memory of 760 1480 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe svchost.exe PID 760 wrote to memory of 1676 760 svchost.exe notepad.exe PID 760 wrote to memory of 1676 760 svchost.exe notepad.exe PID 760 wrote to memory of 1676 760 svchost.exe notepad.exe PID 760 wrote to memory of 1676 760 svchost.exe notepad.exe PID 760 wrote to memory of 1676 760 svchost.exe notepad.exe PID 1480 wrote to memory of 1004 1480 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 1480 wrote to memory of 1004 1480 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 1480 wrote to memory of 1004 1480 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 1480 wrote to memory of 1004 1480 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 1480 wrote to memory of 1004 1480 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 1480 wrote to memory of 1004 1480 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 1480 wrote to memory of 1004 1480 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 1480 wrote to memory of 1004 1480 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 1480 wrote to memory of 1004 1480 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 1480 wrote to memory of 1004 1480 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 1004 wrote to memory of 760 1004 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe svchost.exe PID 1004 wrote to memory of 760 1004 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe svchost.exe PID 1004 wrote to memory of 1204 1004 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe calc.exe PID 1004 wrote to memory of 1204 1004 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe calc.exe PID 1004 wrote to memory of 1676 1004 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe notepad.exe PID 1004 wrote to memory of 1676 1004 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe"C:\Users\Admin\AppData\Local\Temp\28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe"C:\Users\Admin\AppData\Local\Temp\28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\SysWOW64\calc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1204 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"3⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\SysWOW64\notepad.exe"4⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe"C:\Users\Admin\AppData\Local\Temp\28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1004