Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 14:33
Behavioral task
behavioral1
Sample
c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exe
Resource
win10v2004-20240426-en
General
-
Target
c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exe
-
Size
1.1MB
-
MD5
9ffd1931c316b882683d87dd1050d8e3
-
SHA1
9d07ec6e678af5606870436e270f9aceb42a1f15
-
SHA256
c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b
-
SHA512
20b2a0f23bfb5f6de06a2bb93a8262a934c8870e8ba1dc19e9028822dda6390aec92889440950150434af231e56bf242902fd06ad72e3423529af863b809e11d
-
SSDEEP
24576:U5AM2KZA9dG+SbJoDWW3eDoBbbT9LNDigHb2WyTUZ0ed2jaQFjZuj4R:UEm+RaW0oRJLNR729TZecjJFVu0R
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2824-4-0x0000000000400000-0x0000000000702000-memory.dmp upx behavioral2/memory/2824-11-0x0000000000400000-0x0000000000702000-memory.dmp upx behavioral2/memory/2824-6-0x0000000000400000-0x0000000000702000-memory.dmp upx behavioral2/memory/2824-5-0x0000000000400000-0x0000000000702000-memory.dmp upx behavioral2/memory/2824-9-0x0000000000400000-0x0000000000702000-memory.dmp upx behavioral2/memory/2824-12-0x0000000000400000-0x0000000000702000-memory.dmp upx behavioral2/memory/2824-10-0x0000000000400000-0x0000000000702000-memory.dmp upx behavioral2/memory/2824-21-0x0000000000400000-0x0000000000702000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
Processes:
c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exedescription pid process target process PID 4716 set thread context of 2824 4716 c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exe diskperf.exe -
Drops file in Windows directory 1 IoCs
Processes:
c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exedescription ioc process File created C:\Windows\1008671.txt c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exepid process 4716 c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exe 4716 c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exe 4716 c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exe 4716 c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exe 4716 c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exe 4716 c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exedescription pid process Token: SeDebugPrivilege 4716 c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exediskperf.exepid process 4716 c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exe 2824 diskperf.exe 2824 diskperf.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exesihost.exedescription pid process target process PID 4716 wrote to memory of 2948 4716 c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exe sihost.exe PID 2948 wrote to memory of 2824 2948 sihost.exe diskperf.exe PID 2948 wrote to memory of 2824 2948 sihost.exe diskperf.exe PID 2948 wrote to memory of 2824 2948 sihost.exe diskperf.exe PID 4716 wrote to memory of 2824 4716 c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exe diskperf.exe PID 4716 wrote to memory of 2824 4716 c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exe diskperf.exe PID 4716 wrote to memory of 2824 4716 c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exe diskperf.exe PID 4716 wrote to memory of 2824 4716 c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exe diskperf.exe PID 4716 wrote to memory of 2824 4716 c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exe diskperf.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\diskperf.exeC:\Windows\SysWOW64\diskperf.exe 1008610086712⤵
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exe"C:\Users\Admin\AppData\Local\Temp\c28ed60c480b4bcef1f83334b56df25f4ac95db92fe150030d7fd2f12b05183b.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4716