Analysis
-
max time kernel
140s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:43
Static task
static1
Behavioral task
behavioral1
Sample
28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe
Resource
win10v2004-20220812-en
General
-
Target
28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe
-
Size
378KB
-
MD5
6b5d08cd9f7a0709f259657bb2b0668d
-
SHA1
9ffd7711f4bf51bdcfd079b06c64ec12c83d4f00
-
SHA256
28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d
-
SHA512
22e04fd86212fec3acf36ddd32690ce80e2ba83be0c16776c72ecbb6ec9081fbd74afa319a2a79307c705ce5f062b84f5b6a97e8ead895c3d14b90c6bac94f2d
-
SSDEEP
3072:gnjFDUYY1tKvF4c7yoke8606093wDwUcpr+dkI2zM5Q:gnj1ItZoke8d9gUrpzkG
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
notepad.exesvchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Gqazaf = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\Gqazaf.exe" notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe System Incorporated = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Adobe\\Reader_sl.exe" svchost.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
svchost.exenotepad.exedescription ioc process File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\D: notepad.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\T: svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exedescription pid process target process PID 2652 set thread context of 4416 2652 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 4416 set thread context of 4788 4416 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exesvchost.exe28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exepid process 2652 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 2652 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 2652 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 2652 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 4892 svchost.exe 4892 svchost.exe 4788 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 4788 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 4788 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exepid process 4416 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exesvchost.exenotepad.execalc.exedescription pid process Token: SeDebugPrivilege 4788 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe Token: SeDebugPrivilege 4892 svchost.exe Token: SeDebugPrivilege 2860 notepad.exe Token: SeDebugPrivilege 4884 calc.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exesvchost.exe28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exedescription pid process target process PID 2652 wrote to memory of 4416 2652 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 2652 wrote to memory of 4416 2652 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 2652 wrote to memory of 4416 2652 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 2652 wrote to memory of 4416 2652 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 2652 wrote to memory of 4416 2652 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 2652 wrote to memory of 4416 2652 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 2652 wrote to memory of 4416 2652 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 2652 wrote to memory of 4416 2652 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 2652 wrote to memory of 4416 2652 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 2652 wrote to memory of 4416 2652 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 4416 wrote to memory of 4892 4416 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe svchost.exe PID 4416 wrote to memory of 4892 4416 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe svchost.exe PID 4416 wrote to memory of 4892 4416 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe svchost.exe PID 4416 wrote to memory of 4892 4416 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe svchost.exe PID 4416 wrote to memory of 4884 4416 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe calc.exe PID 4416 wrote to memory of 4884 4416 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe calc.exe PID 4416 wrote to memory of 4884 4416 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe calc.exe PID 4416 wrote to memory of 4884 4416 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe calc.exe PID 4416 wrote to memory of 4884 4416 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe calc.exe PID 4892 wrote to memory of 2860 4892 svchost.exe notepad.exe PID 4892 wrote to memory of 2860 4892 svchost.exe notepad.exe PID 4892 wrote to memory of 2860 4892 svchost.exe notepad.exe PID 4892 wrote to memory of 2860 4892 svchost.exe notepad.exe PID 4416 wrote to memory of 4788 4416 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 4416 wrote to memory of 4788 4416 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 4416 wrote to memory of 4788 4416 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 4416 wrote to memory of 4788 4416 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 4416 wrote to memory of 4788 4416 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 4416 wrote to memory of 4788 4416 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 4416 wrote to memory of 4788 4416 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 4416 wrote to memory of 4788 4416 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 4416 wrote to memory of 4788 4416 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe PID 4788 wrote to memory of 4884 4788 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe calc.exe PID 4788 wrote to memory of 4884 4788 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe calc.exe PID 4788 wrote to memory of 4892 4788 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe svchost.exe PID 4788 wrote to memory of 4892 4788 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe svchost.exe PID 4788 wrote to memory of 2860 4788 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe notepad.exe PID 4788 wrote to memory of 2860 4788 28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe"C:\Users\Admin\AppData\Local\Temp\28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe"C:\Users\Admin\AppData\Local\Temp\28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"3⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\SysWOW64\notepad.exe"4⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:2860 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\SysWOW64\calc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe"C:\Users\Admin\AppData\Local\Temp\28b6d1a4ee0a9177e4194f09ac4c157f55589cfa137f4b90ebf04620bf25f87d.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4788