Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
28887b56ef13dc19b261f718a2a286e8.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
28887b56ef13dc19b261f718a2a286e8.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
28887b56ef13dc19b261f718a2a286e8.exe
-
Size
68KB
-
MD5
28887b56ef13dc19b261f718a2a286e8
-
SHA1
54ed7f96f6bbcdc0a29cb24ac7d09c25368fe6a9
-
SHA256
c40bba9a3744cc565252f829b409741afd5779cc24ea65dee7d63c609981c4be
-
SHA512
985c22beccbe5462d31d9499d2e859b2073e030e3f93147b3ebe8b1f329dc5a8e94d63db515330c699df2e325bc1d6143e2b5c2637ffc61bc2bf48a6dce72967
-
SSDEEP
1536:D1QIkBYlLUZc25ZzOWTqiGDrvj3xHx7jtGDDXm9cft:DzZlLUZc+HTqisr77iDft
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3036 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2916 set thread context of 2748 2916 28887b56ef13dc19b261f718a2a286e8.exe 16 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2916 28887b56ef13dc19b261f718a2a286e8.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2748 2916 28887b56ef13dc19b261f718a2a286e8.exe 16 PID 2916 wrote to memory of 2748 2916 28887b56ef13dc19b261f718a2a286e8.exe 16 PID 2916 wrote to memory of 2748 2916 28887b56ef13dc19b261f718a2a286e8.exe 16 PID 2916 wrote to memory of 2748 2916 28887b56ef13dc19b261f718a2a286e8.exe 16 PID 2916 wrote to memory of 2748 2916 28887b56ef13dc19b261f718a2a286e8.exe 16 PID 2916 wrote to memory of 2748 2916 28887b56ef13dc19b261f718a2a286e8.exe 16 PID 2916 wrote to memory of 2748 2916 28887b56ef13dc19b261f718a2a286e8.exe 16 PID 2916 wrote to memory of 2748 2916 28887b56ef13dc19b261f718a2a286e8.exe 16 PID 2748 wrote to memory of 3036 2748 28887b56ef13dc19b261f718a2a286e8.exe 30 PID 2748 wrote to memory of 3036 2748 28887b56ef13dc19b261f718a2a286e8.exe 30 PID 2748 wrote to memory of 3036 2748 28887b56ef13dc19b261f718a2a286e8.exe 30 PID 2748 wrote to memory of 3036 2748 28887b56ef13dc19b261f718a2a286e8.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\28887b56ef13dc19b261f718a2a286e8.exe"C:\Users\Admin\AppData\Local\Temp\28887b56ef13dc19b261f718a2a286e8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\28887b56ef13dc19b261f718a2a286e8.exeC:\Users\Admin\AppData\Local\Temp\28887b56ef13dc19b261f718a2a286e8.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\28887b56ef13dc19b261f718a2a286e8.exe" >> NUL3⤵
- Deletes itself
PID:3036
-
-