Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows7_x64 -
resource
win7 -
submitted
19-07-2020 19:29
Static task
static1
Behavioral task
behavioral1
Sample
zeus 2_2.0.9.5.vir.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
zeus 2_2.0.9.5.vir.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
zeus 2_2.0.9.5.vir.exe
-
Size
178KB
-
MD5
ab2a53cdd738d64f58f878a1d7b39355
-
SHA1
d9bdddec5dfaa40d07b437843d95f3dbc8f7bd3d
-
SHA256
41ea373c7a57eb0c9103d7b4edb4cc2a381f80cfff02dfe704f851ae8722853e
-
SHA512
a8db01348fe18a94dd6edd9d1eeb67af75ffe378243dd9a2ebe15e1bac92d933ef7e6f7550165ec37808f2f9780023fa26041cbfa90832985533082e614e5f6e
Score
8/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
odki.exepid process 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
odki.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\Currentversion\Policies\Explorer\Run odki.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\{5DB791E0-D2FB-96EC-96B8-A28E8F22982C} = "C:\\Users\\Admin\\AppData\\Roaming\\Uletyw\\odki.exe" odki.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
zeus 2_2.0.9.5.vir.exeodki.exedescription pid process target process PID 1492 set thread context of 1588 1492 zeus 2_2.0.9.5.vir.exe zeus 2_2.0.9.5.vir.exe PID 532 set thread context of 756 532 odki.exe odki.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
zeus 2_2.0.9.5.vir.exedescription pid process Token: SeSecurityPrivilege 1588 zeus 2_2.0.9.5.vir.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1108 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
odki.exepid process 756 odki.exe -
Suspicious use of WriteProcessMemory 62 IoCs
Processes:
zeus 2_2.0.9.5.vir.exezeus 2_2.0.9.5.vir.exeodki.exeodki.exedescription pid process target process PID 1492 wrote to memory of 1588 1492 zeus 2_2.0.9.5.vir.exe zeus 2_2.0.9.5.vir.exe PID 1492 wrote to memory of 1588 1492 zeus 2_2.0.9.5.vir.exe zeus 2_2.0.9.5.vir.exe PID 1492 wrote to memory of 1588 1492 zeus 2_2.0.9.5.vir.exe zeus 2_2.0.9.5.vir.exe PID 1492 wrote to memory of 1588 1492 zeus 2_2.0.9.5.vir.exe zeus 2_2.0.9.5.vir.exe PID 1492 wrote to memory of 1588 1492 zeus 2_2.0.9.5.vir.exe zeus 2_2.0.9.5.vir.exe PID 1492 wrote to memory of 1588 1492 zeus 2_2.0.9.5.vir.exe zeus 2_2.0.9.5.vir.exe PID 1492 wrote to memory of 1588 1492 zeus 2_2.0.9.5.vir.exe zeus 2_2.0.9.5.vir.exe PID 1492 wrote to memory of 1588 1492 zeus 2_2.0.9.5.vir.exe zeus 2_2.0.9.5.vir.exe PID 1492 wrote to memory of 1588 1492 zeus 2_2.0.9.5.vir.exe zeus 2_2.0.9.5.vir.exe PID 1492 wrote to memory of 1588 1492 zeus 2_2.0.9.5.vir.exe zeus 2_2.0.9.5.vir.exe PID 1588 wrote to memory of 532 1588 zeus 2_2.0.9.5.vir.exe odki.exe PID 1588 wrote to memory of 532 1588 zeus 2_2.0.9.5.vir.exe odki.exe PID 1588 wrote to memory of 532 1588 zeus 2_2.0.9.5.vir.exe odki.exe PID 1588 wrote to memory of 532 1588 zeus 2_2.0.9.5.vir.exe odki.exe PID 532 wrote to memory of 756 532 odki.exe odki.exe PID 532 wrote to memory of 756 532 odki.exe odki.exe PID 532 wrote to memory of 756 532 odki.exe odki.exe PID 532 wrote to memory of 756 532 odki.exe odki.exe PID 532 wrote to memory of 756 532 odki.exe odki.exe PID 532 wrote to memory of 756 532 odki.exe odki.exe PID 532 wrote to memory of 756 532 odki.exe odki.exe PID 532 wrote to memory of 756 532 odki.exe odki.exe PID 532 wrote to memory of 756 532 odki.exe odki.exe PID 532 wrote to memory of 756 532 odki.exe odki.exe PID 1588 wrote to memory of 1108 1588 zeus 2_2.0.9.5.vir.exe cmd.exe PID 1588 wrote to memory of 1108 1588 zeus 2_2.0.9.5.vir.exe cmd.exe PID 1588 wrote to memory of 1108 1588 zeus 2_2.0.9.5.vir.exe cmd.exe PID 1588 wrote to memory of 1108 1588 zeus 2_2.0.9.5.vir.exe cmd.exe PID 756 wrote to memory of 1480 756 odki.exe explorer.exe PID 756 wrote to memory of 1480 756 odki.exe explorer.exe PID 756 wrote to memory of 1480 756 odki.exe explorer.exe PID 756 wrote to memory of 1480 756 odki.exe explorer.exe PID 756 wrote to memory of 1092 756 odki.exe taskhost.exe PID 756 wrote to memory of 1092 756 odki.exe taskhost.exe PID 756 wrote to memory of 1092 756 odki.exe taskhost.exe PID 756 wrote to memory of 1092 756 odki.exe taskhost.exe PID 756 wrote to memory of 1092 756 odki.exe taskhost.exe PID 756 wrote to memory of 1184 756 odki.exe Dwm.exe PID 756 wrote to memory of 1184 756 odki.exe Dwm.exe PID 756 wrote to memory of 1184 756 odki.exe Dwm.exe PID 756 wrote to memory of 1184 756 odki.exe Dwm.exe PID 756 wrote to memory of 1184 756 odki.exe Dwm.exe PID 756 wrote to memory of 1228 756 odki.exe Explorer.EXE PID 756 wrote to memory of 1228 756 odki.exe Explorer.EXE PID 756 wrote to memory of 1228 756 odki.exe Explorer.EXE PID 756 wrote to memory of 1228 756 odki.exe Explorer.EXE PID 756 wrote to memory of 1228 756 odki.exe Explorer.EXE PID 756 wrote to memory of 1892 756 odki.exe DllHost.exe PID 756 wrote to memory of 1892 756 odki.exe DllHost.exe PID 756 wrote to memory of 1892 756 odki.exe DllHost.exe PID 756 wrote to memory of 1892 756 odki.exe DllHost.exe PID 756 wrote to memory of 1892 756 odki.exe DllHost.exe PID 756 wrote to memory of 1140 756 odki.exe DllHost.exe PID 756 wrote to memory of 1140 756 odki.exe DllHost.exe PID 756 wrote to memory of 1140 756 odki.exe DllHost.exe PID 756 wrote to memory of 1140 756 odki.exe DllHost.exe PID 756 wrote to memory of 1140 756 odki.exe DllHost.exe PID 756 wrote to memory of 1928 756 odki.exe DllHost.exe PID 756 wrote to memory of 1928 756 odki.exe DllHost.exe PID 756 wrote to memory of 1928 756 odki.exe DllHost.exe PID 756 wrote to memory of 1928 756 odki.exe DllHost.exe PID 756 wrote to memory of 1928 756 odki.exe DllHost.exe -
Loads dropped DLL 5 IoCs
Processes:
zeus 2_2.0.9.5.vir.exeodki.exepid process 1588 zeus 2_2.0.9.5.vir.exe 756 odki.exe 756 odki.exe 756 odki.exe 756 odki.exe -
Executes dropped EXE 2 IoCs
Processes:
odki.exeodki.exepid process 532 odki.exe 756 odki.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\zeus 2_2.0.9.5.vir.exe"C:\Users\Admin\AppData\Local\Temp\zeus 2_2.0.9.5.vir.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\zeus 2_2.0.9.5.vir.exe"C:\Users\Admin\AppData\Local\Temp\zeus 2_2.0.9.5.vir.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Uletyw\odki.exe"C:\Users\Admin\AppData\Roaming\Uletyw\odki.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Uletyw\odki.exeC:\Users\Admin\AppData\Roaming\Uletyw\odki.exe5⤵
- Suspicious behavior: EnumeratesProcesses
- Adds policy Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
- Loads dropped DLL
- Executes dropped EXE
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp9f5ba87e.bat"4⤵
- Deletes itself
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp9f5ba87e.bat
-
C:\Users\Admin\AppData\Roaming\Uletyw\odki.exe
-
C:\Users\Admin\AppData\Roaming\Uletyw\odki.exe
-
C:\Users\Admin\AppData\Roaming\Uletyw\odki.exe
-
\Users\Admin\AppData\Local\Temp\kernel32.dll
-
\Users\Admin\AppData\Local\Temp\kernel32.dll
-
\Users\Admin\AppData\Local\Temp\ntdll.dll
-
\Users\Admin\AppData\Local\Temp\ntdll.dll
-
\Users\Admin\AppData\Roaming\Uletyw\odki.exe
-
memory/532-4-0x0000000000000000-mapping.dmp
-
memory/756-7-0x0000000000415C5E-mapping.dmp
-
memory/1108-11-0x0000000000000000-mapping.dmp
-
memory/1480-16-0x0000000000000000-mapping.dmp
-
memory/1588-2-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/1588-0-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/1588-1-0x0000000000415C5E-mapping.dmp