Analysis
-
max time kernel
138s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 12:49
Static task
static1
Behavioral task
behavioral1
Sample
28853008022b9808fdceb25df33daff4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
28853008022b9808fdceb25df33daff4.exe
Resource
win10v2004-20231201-en
General
-
Target
28853008022b9808fdceb25df33daff4.exe
-
Size
430KB
-
MD5
28853008022b9808fdceb25df33daff4
-
SHA1
4eed2e4101364d6ac64efc188201089ef2afe29d
-
SHA256
278cdd50bb6eccfddb20adf5af29e071e46804e82f6557a867bab2a716824129
-
SHA512
be9b257fca64aac805f97df0b52d0e40351e10f4e65bb2e48a0b06cb495e272675526c91c1282f3d294de95e3bddb03592e88602bf0778939368740b777342aa
-
SSDEEP
12288:ibee0PGl89WazvzkmMxM+ltxQMAn0Iv1b70ZSf2x:2edGBazvZMHltxtIv1bUS+x
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Winder.lnk 28853008022b9808fdceb25df33daff4.exe -
Loads dropped DLL 1 IoCs
pid Process 2176 28853008022b9808fdceb25df33daff4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\28853008022b9808fdceb25df33daff4.exe = "C:\\System32\\28853008022b9808fdceb25df33daff4.exe" 28853008022b9808fdceb25df33daff4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2176 28853008022b9808fdceb25df33daff4.exe 2176 28853008022b9808fdceb25df33daff4.exe 2176 28853008022b9808fdceb25df33daff4.exe 2176 28853008022b9808fdceb25df33daff4.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2176 28853008022b9808fdceb25df33daff4.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2176 28853008022b9808fdceb25df33daff4.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2176 28853008022b9808fdceb25df33daff4.exe 2176 28853008022b9808fdceb25df33daff4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2752 2176 28853008022b9808fdceb25df33daff4.exe 28 PID 2176 wrote to memory of 2752 2176 28853008022b9808fdceb25df33daff4.exe 28 PID 2176 wrote to memory of 2752 2176 28853008022b9808fdceb25df33daff4.exe 28 PID 2176 wrote to memory of 2752 2176 28853008022b9808fdceb25df33daff4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\28853008022b9808fdceb25df33daff4.exe"C:\Users\Admin\AppData\Local\Temp\28853008022b9808fdceb25df33daff4.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS1.vbs"2⤵PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
653B
MD5ad04218519f73db2111444d2e096aeae
SHA1ce298ed0ccd2dff5718618b18dc6696e05dc2a3e
SHA25665271350ba6b4d7aa7df6c5a081c6f0cd78fc659a5bbe5c9821eba2561cb5b68
SHA5128bc3eb092d87e6a873fe717e6ad937958ce9dbe164d13bb385b7865f1a3755955949db99db62a2c3e42392f16ac3297273b1d4042adb2fde5d20200db2add2f1
-
Filesize
430KB
MD5893f721f827bbac380f39b9ce8deead1
SHA1ac8e7184da1786e203bd2e263bfc7feace29b8e6
SHA256d385b51d1fad23123d6e6784d5e393e2237dc1f8a907edfac6be45c927d02e0d
SHA512a77dc674acf3f36944912f97f8eb9673d281d7bf347e8025da4e68daf3785e17ff4a193fa9031faa39fa4f9965ab6abfaccb1e8fbba0791a5cd907f6a23408b8