Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7 -
submitted
19-07-2020 17:15
Static task
static1
Behavioral task
behavioral1
Sample
zeus 2_2.0.4.0.vir.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
zeus 2_2.0.4.0.vir.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
zeus 2_2.0.4.0.vir.exe
-
Size
197KB
-
MD5
16374c7a87c60d8c0faefcc168785af6
-
SHA1
d37159f02d5c6ab273edb92eb159f05d286c9d0a
-
SHA256
55412a1f909695ad8ec22a5302142a4c9194bd4c2de98672d41953b620bc2e27
-
SHA512
e4c7947bb2ef5c5647561f8bd07d233ddf2a4263b4fa9a0a077b9c750bb0f9019b21dadd429d6734993e35b4290d04542192273a49c815279c11b069714274e5
Score
8/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
mihag.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D8B65A1C-934F-B0BA-068C-F0914897AA4D} = "C:\\Users\\Admin\\AppData\\Roaming\\Ivlys\\mihag.exe" mihag.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\Currentversion\Run mihag.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
zeus 2_2.0.4.0.vir.exedescription pid process Token: SeSecurityPrivilege 1496 zeus 2_2.0.4.0.vir.exe Token: SeSecurityPrivilege 1496 zeus 2_2.0.4.0.vir.exe Token: SeSecurityPrivilege 1496 zeus 2_2.0.4.0.vir.exe -
Loads dropped DLL 2 IoCs
Processes:
zeus 2_2.0.4.0.vir.exepid process 1496 zeus 2_2.0.4.0.vir.exe 1496 zeus 2_2.0.4.0.vir.exe -
Suspicious use of WriteProcessMemory 58 IoCs
Processes:
zeus 2_2.0.4.0.vir.exemihag.exedescription pid process target process PID 1496 wrote to memory of 1020 1496 zeus 2_2.0.4.0.vir.exe mihag.exe PID 1496 wrote to memory of 1020 1496 zeus 2_2.0.4.0.vir.exe mihag.exe PID 1496 wrote to memory of 1020 1496 zeus 2_2.0.4.0.vir.exe mihag.exe PID 1496 wrote to memory of 1020 1496 zeus 2_2.0.4.0.vir.exe mihag.exe PID 1020 wrote to memory of 1092 1020 mihag.exe taskhost.exe PID 1020 wrote to memory of 1092 1020 mihag.exe taskhost.exe PID 1020 wrote to memory of 1092 1020 mihag.exe taskhost.exe PID 1020 wrote to memory of 1092 1020 mihag.exe taskhost.exe PID 1020 wrote to memory of 1092 1020 mihag.exe taskhost.exe PID 1020 wrote to memory of 1180 1020 mihag.exe Dwm.exe PID 1020 wrote to memory of 1180 1020 mihag.exe Dwm.exe PID 1020 wrote to memory of 1180 1020 mihag.exe Dwm.exe PID 1020 wrote to memory of 1180 1020 mihag.exe Dwm.exe PID 1020 wrote to memory of 1180 1020 mihag.exe Dwm.exe PID 1020 wrote to memory of 1228 1020 mihag.exe Explorer.EXE PID 1020 wrote to memory of 1228 1020 mihag.exe Explorer.EXE PID 1020 wrote to memory of 1228 1020 mihag.exe Explorer.EXE PID 1020 wrote to memory of 1228 1020 mihag.exe Explorer.EXE PID 1020 wrote to memory of 1228 1020 mihag.exe Explorer.EXE PID 1020 wrote to memory of 1496 1020 mihag.exe zeus 2_2.0.4.0.vir.exe PID 1020 wrote to memory of 1496 1020 mihag.exe zeus 2_2.0.4.0.vir.exe PID 1020 wrote to memory of 1496 1020 mihag.exe zeus 2_2.0.4.0.vir.exe PID 1020 wrote to memory of 1496 1020 mihag.exe zeus 2_2.0.4.0.vir.exe PID 1020 wrote to memory of 1496 1020 mihag.exe zeus 2_2.0.4.0.vir.exe PID 1496 wrote to memory of 1044 1496 zeus 2_2.0.4.0.vir.exe cmd.exe PID 1496 wrote to memory of 1044 1496 zeus 2_2.0.4.0.vir.exe cmd.exe PID 1496 wrote to memory of 1044 1496 zeus 2_2.0.4.0.vir.exe cmd.exe PID 1496 wrote to memory of 1044 1496 zeus 2_2.0.4.0.vir.exe cmd.exe PID 1496 wrote to memory of 1044 1496 zeus 2_2.0.4.0.vir.exe cmd.exe PID 1496 wrote to memory of 1044 1496 zeus 2_2.0.4.0.vir.exe cmd.exe PID 1496 wrote to memory of 1044 1496 zeus 2_2.0.4.0.vir.exe cmd.exe PID 1496 wrote to memory of 1044 1496 zeus 2_2.0.4.0.vir.exe cmd.exe PID 1496 wrote to memory of 1044 1496 zeus 2_2.0.4.0.vir.exe cmd.exe PID 1020 wrote to memory of 1752 1020 mihag.exe DllHost.exe PID 1020 wrote to memory of 1752 1020 mihag.exe DllHost.exe PID 1020 wrote to memory of 1752 1020 mihag.exe DllHost.exe PID 1020 wrote to memory of 1752 1020 mihag.exe DllHost.exe PID 1020 wrote to memory of 1752 1020 mihag.exe DllHost.exe PID 1020 wrote to memory of 1384 1020 mihag.exe DllHost.exe PID 1020 wrote to memory of 1384 1020 mihag.exe DllHost.exe PID 1020 wrote to memory of 1384 1020 mihag.exe DllHost.exe PID 1020 wrote to memory of 1384 1020 mihag.exe DllHost.exe PID 1020 wrote to memory of 1384 1020 mihag.exe DllHost.exe PID 1020 wrote to memory of 1912 1020 mihag.exe DllHost.exe PID 1020 wrote to memory of 1912 1020 mihag.exe DllHost.exe PID 1020 wrote to memory of 1912 1020 mihag.exe DllHost.exe PID 1020 wrote to memory of 1912 1020 mihag.exe DllHost.exe PID 1020 wrote to memory of 1912 1020 mihag.exe DllHost.exe PID 1020 wrote to memory of 1128 1020 mihag.exe DllHost.exe PID 1020 wrote to memory of 1128 1020 mihag.exe DllHost.exe PID 1020 wrote to memory of 1128 1020 mihag.exe DllHost.exe PID 1020 wrote to memory of 1128 1020 mihag.exe DllHost.exe PID 1020 wrote to memory of 1128 1020 mihag.exe DllHost.exe PID 1020 wrote to memory of 1540 1020 mihag.exe DllHost.exe PID 1020 wrote to memory of 1540 1020 mihag.exe DllHost.exe PID 1020 wrote to memory of 1540 1020 mihag.exe DllHost.exe PID 1020 wrote to memory of 1540 1020 mihag.exe DllHost.exe PID 1020 wrote to memory of 1540 1020 mihag.exe DllHost.exe -
Executes dropped EXE 1 IoCs
Processes:
mihag.exepid process 1020 mihag.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
Processes:
mihag.exepid process 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe 1020 mihag.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
zeus 2_2.0.4.0.vir.exedescription pid process target process PID 1496 set thread context of 1044 1496 zeus 2_2.0.4.0.vir.exe cmd.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1044 cmd.exe -
Processes:
zeus 2_2.0.4.0.vir.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Privacy zeus 2_2.0.4.0.vir.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" zeus 2_2.0.4.0.vir.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\zeus 2_2.0.4.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zeus 2_2.0.4.0.vir.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
-
C:\Users\Admin\AppData\Roaming\Ivlys\mihag.exe"C:\Users\Admin\AppData\Roaming\Ivlys\mihag.exe"3⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp09d902e5.bat"3⤵
- Deletes itself
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp09d902e5.bat
-
C:\Users\Admin\AppData\Roaming\Dysia\eqka.veu
-
C:\Users\Admin\AppData\Roaming\Ivlys\mihag.exe
-
C:\Users\Admin\AppData\Roaming\Ivlys\mihag.exe
-
\Users\Admin\AppData\Roaming\Ivlys\mihag.exe
-
\Users\Admin\AppData\Roaming\Ivlys\mihag.exe
-
memory/1020-2-0x0000000000000000-mapping.dmp
-
memory/1044-5-0x0000000000050000-0x0000000000069000-memory.dmpFilesize
100KB
-
memory/1044-7-0x0000000000053A5F-mapping.dmp