Analysis

  • max time kernel
    148s
  • max time network
    102s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    07/07/2020, 18:57

General

  • Target

    ZWSTt.exe

  • Size

    1.1MB

  • MD5

    20e64b93aca0efbe72c29ecb1bf0b83f

  • SHA1

    6d30fd63bfe8df6f57e7de64084bc4dc76be4126

  • SHA256

    1630f3fabf80e99d1990176b5736835496bdbd74610d1e43eefd7088e2529a6e

  • SHA512

    046ace67eee709a9e260ee55d2509e99dca2aac41effc660df0cf3c93a38e09f47aad71f22a3acc2a2defcc06acbc5c266441b263e0c1507803ec0ef08069c5b

Score
8/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Adds Run entry to start application 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 407 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ZWSTt.exe
    "C:\Users\Admin\AppData\Local\Temp\ZWSTt.exe"
    1⤵
    • Adds Run entry to start application
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c <nul set /p ="M" > services.com & type pNwYgA.com >> services.com & del pNwYgA.com & certutil -decode tZBC.com J & services.com J & ping 127.0.0.1 -n 3
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1552
      • C:\Windows\SysWOW64\certutil.exe
        certutil -decode tZBC.com J
        3⤵
          PID:1616
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\services.com
          services.com J
          3⤵
          • Loads dropped DLL
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:336
          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\services.com
            C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\services.com J
            4⤵
            • Loads dropped DLL
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:1636
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\services.com
              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\services.com
              5⤵
                PID:1812
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 3
            3⤵
            • Runs ping.exe
            PID:1512

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1812-15-0x0000000000850000-0x000000001266B000-memory.dmp

        Filesize

        286.1MB

      • memory/1812-16-0x0000000000850000-0x000000001266B000-memory.dmp

        Filesize

        286.1MB

      • memory/1812-17-0x0000000000850000-0x000000001266B000-memory.dmp

        Filesize

        286.1MB

      • memory/1812-18-0x0000000000850000-0x000000001266B000-memory.dmp

        Filesize

        286.1MB

      • memory/1812-342-0x0000000000850000-0x000000001266B000-memory.dmp

        Filesize

        286.1MB

      • memory/1812-343-0x0000000000850000-0x000000001266B000-memory.dmp

        Filesize

        286.1MB

      • memory/1812-344-0x0000000000850000-0x000000001266B000-memory.dmp

        Filesize

        286.1MB

      • memory/1812-345-0x0000000000850000-0x000000001266B000-memory.dmp

        Filesize

        286.1MB

      • memory/1812-352-0x0000000000850000-0x000000001266B000-memory.dmp

        Filesize

        286.1MB