Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
09/10/2023, 00:55
Static task
static1
Behavioral task
behavioral1
Sample
f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe
Resource
win10v2004-20230915-en
General
-
Target
f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe
-
Size
4.7MB
-
MD5
47e6fa06bc05562202cfd00088d7e0a0
-
SHA1
0b6492a2d204b46da76916953c60dced91e8bfbd
-
SHA256
f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7
-
SHA512
80c9837dbc82ce2628cbb1f20d433b630da67a739abbe9f00487d7ae1699fbf36a1d919d854f2a3242772160aefcc964818a48870b9463642e53de31200ea279
-
SSDEEP
98304:JHN8h9LYJfPGk4jwMdPFAZwiN9G/nRrQZe6HZj99CmBJy9wXM:DJMwUFEwD9kHB9Uqs9w8
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe File opened (read-only) \??\M: f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe File opened (read-only) \??\W: f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe File opened (read-only) \??\G: f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe File opened (read-only) \??\L: f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe File opened (read-only) \??\N: f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe File opened (read-only) \??\O: f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe File opened (read-only) \??\P: f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe File opened (read-only) \??\V: f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe File opened (read-only) \??\Y: f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe File opened (read-only) \??\Z: f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe File opened (read-only) \??\A: f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe File opened (read-only) \??\J: f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe File opened (read-only) \??\K: f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe File opened (read-only) \??\R: f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe File opened (read-only) \??\U: f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe File opened (read-only) \??\T: f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe File opened (read-only) \??\X: f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe File opened (read-only) \??\B: f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe File opened (read-only) \??\E: f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe File opened (read-only) \??\I: f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe File opened (read-only) \??\Q: f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe File opened (read-only) \??\S: f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe"C:\Users\Admin\AppData\Local\Temp\f28a8d3ca7e3cb7b893821132f093bd0af6bd6c0b6c0e99801d0ece60ceb98a7.exe"1⤵
- Enumerates connected drives
- Checks processor information in registry
- Enumerates system info in registry
PID:2232