Analysis
-
max time kernel
25s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 15:07
Behavioral task
behavioral1
Sample
28121bbd281ced41ef28c365b0c6ba18.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
28121bbd281ced41ef28c365b0c6ba18.exe
Resource
win10v2004-20231215-en
General
-
Target
28121bbd281ced41ef28c365b0c6ba18.exe
-
Size
743KB
-
MD5
28121bbd281ced41ef28c365b0c6ba18
-
SHA1
1b8536abf4f8a12804bf58b90eee52d12d40d478
-
SHA256
eafdb3c5937b4012a6e8cd85e4983921b177a64e526e4cbf88e133e0b805dd56
-
SHA512
f7254b1b2d43bbc7d911b8ab9726716b38a91a37631aff9e2e2cc9619c3bd34d4e64cf437d32bf5a65360a230ed2fbc96f3f509d1ae8a6a550341c9722e624b1
-
SSDEEP
12288:iplykujV1tr5q5wa31/B08Tg8LLMTgOLjOuxbutbKG5n2JOs/EPs2WZSrIB9n3Ux:KlyRV1tr5q5wa31/B0ogT/LxbutT2JOv
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3592-0-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral2/memory/3592-17-0x0000000000400000-0x00000000004BC000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 28121bbd281ced41ef28c365b0c6ba18.exe File opened (read-only) \??\Q: 28121bbd281ced41ef28c365b0c6ba18.exe File opened (read-only) \??\R: 28121bbd281ced41ef28c365b0c6ba18.exe File opened (read-only) \??\S: 28121bbd281ced41ef28c365b0c6ba18.exe File opened (read-only) \??\V: 28121bbd281ced41ef28c365b0c6ba18.exe File opened (read-only) \??\X: 28121bbd281ced41ef28c365b0c6ba18.exe File opened (read-only) \??\G: 28121bbd281ced41ef28c365b0c6ba18.exe File opened (read-only) \??\B: 28121bbd281ced41ef28c365b0c6ba18.exe File opened (read-only) \??\M: 28121bbd281ced41ef28c365b0c6ba18.exe File opened (read-only) \??\O: 28121bbd281ced41ef28c365b0c6ba18.exe File opened (read-only) \??\T: 28121bbd281ced41ef28c365b0c6ba18.exe File opened (read-only) \??\A: 28121bbd281ced41ef28c365b0c6ba18.exe File opened (read-only) \??\H: 28121bbd281ced41ef28c365b0c6ba18.exe File opened (read-only) \??\J: 28121bbd281ced41ef28c365b0c6ba18.exe File opened (read-only) \??\N: 28121bbd281ced41ef28c365b0c6ba18.exe File opened (read-only) \??\P: 28121bbd281ced41ef28c365b0c6ba18.exe File opened (read-only) \??\U: 28121bbd281ced41ef28c365b0c6ba18.exe File opened (read-only) \??\E: 28121bbd281ced41ef28c365b0c6ba18.exe File opened (read-only) \??\L: 28121bbd281ced41ef28c365b0c6ba18.exe File opened (read-only) \??\W: 28121bbd281ced41ef28c365b0c6ba18.exe File opened (read-only) \??\Y: 28121bbd281ced41ef28c365b0c6ba18.exe File opened (read-only) \??\Z: 28121bbd281ced41ef28c365b0c6ba18.exe File opened (read-only) \??\K: 28121bbd281ced41ef28c365b0c6ba18.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3592 28121bbd281ced41ef28c365b0c6ba18.exe 3592 28121bbd281ced41ef28c365b0c6ba18.exe 3592 28121bbd281ced41ef28c365b0c6ba18.exe 3592 28121bbd281ced41ef28c365b0c6ba18.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3592 28121bbd281ced41ef28c365b0c6ba18.exe Token: SeCreatePagefilePrivilege 3592 28121bbd281ced41ef28c365b0c6ba18.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3592 28121bbd281ced41ef28c365b0c6ba18.exe 3592 28121bbd281ced41ef28c365b0c6ba18.exe 3592 28121bbd281ced41ef28c365b0c6ba18.exe 3592 28121bbd281ced41ef28c365b0c6ba18.exe 3592 28121bbd281ced41ef28c365b0c6ba18.exe 3592 28121bbd281ced41ef28c365b0c6ba18.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\28121bbd281ced41ef28c365b0c6ba18.exe"C:\Users\Admin\AppData\Local\Temp\28121bbd281ced41ef28c365b0c6ba18.exe"1⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b