Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows7_x64 -
resource
win7 -
submitted
19-07-2020 17:21
Static task
static1
Behavioral task
behavioral1
Sample
zeusaes_2.9.1.0.vir.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
zeusaes_2.9.1.0.vir.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
zeusaes_2.9.1.0.vir.exe
-
Size
230KB
-
MD5
19b1b03104f6d3937e1008972b0bb10d
-
SHA1
aa103d6027ef802e0925e9546f1d817006cdd794
-
SHA256
1f3cb432fec1301eac03a16b40f08df0c29efd9e29b06f600581482a286d12f4
-
SHA512
bb0b242a6a38e86888152334b3e02fbbe0dcc84dacb13a155f93728bf6c13d34aab7a4ac2fcf8510cb7c85b5eb21852adfa73b44fcf901251100a772e6144d6b
Score
8/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
zeusaes_2.9.1.0.vir.exeiexplore.exeezcag.exeIEXPLORE.EXEIEXPLORE.EXEpid process 1496 zeusaes_2.9.1.0.vir.exe 1496 zeusaes_2.9.1.0.vir.exe 1796 iexplore.exe 1796 iexplore.exe 1988 ezcag.exe 1988 ezcag.exe 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE 1796 iexplore.exe 1796 iexplore.exe 1812 IEXPLORE.EXE 1812 IEXPLORE.EXE 1812 IEXPLORE.EXE 1812 IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
zeusaes_2.9.1.0.vir.exeezcag.exeezcag.exepid process 1496 zeusaes_2.9.1.0.vir.exe 1496 zeusaes_2.9.1.0.vir.exe 1988 ezcag.exe 1988 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
zeusaes_2.9.1.0.vir.exeezcag.exedescription pid process target process PID 1496 set thread context of 1796 1496 zeusaes_2.9.1.0.vir.exe iexplore.exe PID 1496 set thread context of 1804 1496 zeusaes_2.9.1.0.vir.exe zeusaes_2.9.1.0.vir.exe PID 1988 set thread context of 2024 1988 ezcag.exe iexplore.exe PID 1988 set thread context of 2032 1988 ezcag.exe ezcag.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
zeusaes_2.9.1.0.vir.exedescription pid process Token: SeSecurityPrivilege 1804 zeusaes_2.9.1.0.vir.exe -
Loads dropped DLL 2 IoCs
Processes:
zeusaes_2.9.1.0.vir.exepid process 1804 zeusaes_2.9.1.0.vir.exe 1804 zeusaes_2.9.1.0.vir.exe -
Checks whether UAC is enabled 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ezcag.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\Currentversion\Run ezcag.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\{54A62C08-B5C8-76AC-31EB-95F9EE7BEF8D} = "C:\\Users\\Admin\\AppData\\Roaming\\Vyfao\\ezcag.exe" ezcag.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
zeusaes_2.9.1.0.vir.exeiexplore.exezeusaes_2.9.1.0.vir.exeezcag.exedescription pid process target process PID 1496 wrote to memory of 1796 1496 zeusaes_2.9.1.0.vir.exe iexplore.exe PID 1496 wrote to memory of 1796 1496 zeusaes_2.9.1.0.vir.exe iexplore.exe PID 1496 wrote to memory of 1796 1496 zeusaes_2.9.1.0.vir.exe iexplore.exe PID 1496 wrote to memory of 1796 1496 zeusaes_2.9.1.0.vir.exe iexplore.exe PID 1496 wrote to memory of 1796 1496 zeusaes_2.9.1.0.vir.exe iexplore.exe PID 1496 wrote to memory of 1796 1496 zeusaes_2.9.1.0.vir.exe iexplore.exe PID 1496 wrote to memory of 1804 1496 zeusaes_2.9.1.0.vir.exe zeusaes_2.9.1.0.vir.exe PID 1496 wrote to memory of 1804 1496 zeusaes_2.9.1.0.vir.exe zeusaes_2.9.1.0.vir.exe PID 1496 wrote to memory of 1804 1496 zeusaes_2.9.1.0.vir.exe zeusaes_2.9.1.0.vir.exe PID 1496 wrote to memory of 1804 1496 zeusaes_2.9.1.0.vir.exe zeusaes_2.9.1.0.vir.exe PID 1496 wrote to memory of 1804 1496 zeusaes_2.9.1.0.vir.exe zeusaes_2.9.1.0.vir.exe PID 1496 wrote to memory of 1804 1496 zeusaes_2.9.1.0.vir.exe zeusaes_2.9.1.0.vir.exe PID 1496 wrote to memory of 1804 1496 zeusaes_2.9.1.0.vir.exe zeusaes_2.9.1.0.vir.exe PID 1496 wrote to memory of 1804 1496 zeusaes_2.9.1.0.vir.exe zeusaes_2.9.1.0.vir.exe PID 1496 wrote to memory of 1804 1496 zeusaes_2.9.1.0.vir.exe zeusaes_2.9.1.0.vir.exe PID 1796 wrote to memory of 1924 1796 iexplore.exe IEXPLORE.EXE PID 1796 wrote to memory of 1924 1796 iexplore.exe IEXPLORE.EXE PID 1796 wrote to memory of 1924 1796 iexplore.exe IEXPLORE.EXE PID 1796 wrote to memory of 1924 1796 iexplore.exe IEXPLORE.EXE PID 1804 wrote to memory of 1988 1804 zeusaes_2.9.1.0.vir.exe ezcag.exe PID 1804 wrote to memory of 1988 1804 zeusaes_2.9.1.0.vir.exe ezcag.exe PID 1804 wrote to memory of 1988 1804 zeusaes_2.9.1.0.vir.exe ezcag.exe PID 1804 wrote to memory of 1988 1804 zeusaes_2.9.1.0.vir.exe ezcag.exe PID 1988 wrote to memory of 2024 1988 ezcag.exe iexplore.exe PID 1988 wrote to memory of 2024 1988 ezcag.exe iexplore.exe PID 1988 wrote to memory of 2024 1988 ezcag.exe iexplore.exe PID 1988 wrote to memory of 2024 1988 ezcag.exe iexplore.exe PID 1988 wrote to memory of 2024 1988 ezcag.exe iexplore.exe PID 1988 wrote to memory of 2024 1988 ezcag.exe iexplore.exe PID 1988 wrote to memory of 2032 1988 ezcag.exe ezcag.exe PID 1988 wrote to memory of 2032 1988 ezcag.exe ezcag.exe PID 1988 wrote to memory of 2032 1988 ezcag.exe ezcag.exe PID 1988 wrote to memory of 2032 1988 ezcag.exe ezcag.exe PID 1988 wrote to memory of 2032 1988 ezcag.exe ezcag.exe PID 1988 wrote to memory of 2032 1988 ezcag.exe ezcag.exe PID 1988 wrote to memory of 2032 1988 ezcag.exe ezcag.exe PID 1988 wrote to memory of 2032 1988 ezcag.exe ezcag.exe PID 1988 wrote to memory of 2032 1988 ezcag.exe ezcag.exe PID 1796 wrote to memory of 1812 1796 iexplore.exe IEXPLORE.EXE PID 1796 wrote to memory of 1812 1796 iexplore.exe IEXPLORE.EXE PID 1796 wrote to memory of 1812 1796 iexplore.exe IEXPLORE.EXE PID 1796 wrote to memory of 1812 1796 iexplore.exe IEXPLORE.EXE PID 1804 wrote to memory of 1816 1804 zeusaes_2.9.1.0.vir.exe cmd.exe PID 1804 wrote to memory of 1816 1804 zeusaes_2.9.1.0.vir.exe cmd.exe PID 1804 wrote to memory of 1816 1804 zeusaes_2.9.1.0.vir.exe cmd.exe PID 1804 wrote to memory of 1816 1804 zeusaes_2.9.1.0.vir.exe cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
ezcag.exeezcag.exepid process 1988 ezcag.exe 2032 ezcag.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
iexplore.exeezcag.exepid process 1796 iexplore.exe 2032 ezcag.exe 1796 iexplore.exe -
Suspicious behavior: MapViewOfSection 10 IoCs
Processes:
ezcag.exepid process 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe 2032 ezcag.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1816 cmd.exe -
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{40991C61-C9E4-11EA-A382-5A6C71686AEC} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "301944251" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\zeusaes_2.9.1.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\zeusaes_2.9.1.0.vir.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
- Suspicious use of FindShellTrayWindow
- Modifies Internet Explorer settings
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1796 CREDAT:275457 /prefetch:23⤵
- Suspicious use of SetWindowsHookEx
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1796 CREDAT:472065 /prefetch:23⤵
- Suspicious use of SetWindowsHookEx
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
-
C:\Users\Admin\AppData\Local\Temp\zeusaes_2.9.1.0.vir.exeC:\Users\Admin\AppData\Local\Temp\zeusaes_2.9.1.0.vir.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Vyfao\ezcag.exe"C:\Users\Admin\AppData\Roaming\Vyfao\ezcag.exe"3⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Checks whether UAC is enabled
-
C:\Users\Admin\AppData\Roaming\Vyfao\ezcag.exeC:\Users\Admin\AppData\Roaming\Vyfao\ezcag.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Adds Run key to start application
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpfea7e2cb.bat"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpfea7e2cb.bat
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\GXY2I3NV.txt
-
C:\Users\Admin\AppData\Roaming\Vyfao\ezcag.exe
-
C:\Users\Admin\AppData\Roaming\Vyfao\ezcag.exe
-
C:\Users\Admin\AppData\Roaming\Vyfao\ezcag.exe
-
\Users\Admin\AppData\Roaming\Vyfao\ezcag.exe
-
\Users\Admin\AppData\Roaming\Vyfao\ezcag.exe
-
memory/1496-1-0x0000000002F60000-0x0000000002F71000-memory.dmpFilesize
68KB
-
memory/1496-4-0x0000000002F60000-0x0000000002F71000-memory.dmpFilesize
68KB
-
memory/1496-0-0x0000000002F60000-0x0000000002F71000-memory.dmpFilesize
68KB
-
memory/1796-2-0x0000000000400000-0x0000000000401000-memory.dmpFilesize
4KB
-
memory/1796-3-0x0000000000400459-mapping.dmp
-
memory/1804-5-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/1804-7-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/1804-6-0x000000000040B41E-mapping.dmp
-
memory/1812-22-0x0000000000000000-mapping.dmp
-
memory/1816-24-0x0000000000000000-mapping.dmp
-
memory/1924-8-0x0000000000000000-mapping.dmp
-
memory/1988-11-0x0000000000000000-mapping.dmp
-
memory/1988-14-0x0000000002BA0000-0x0000000002BB1000-memory.dmpFilesize
68KB
-
memory/1988-15-0x0000000002BA0000-0x0000000002BB1000-memory.dmpFilesize
68KB
-
memory/2024-17-0x0000000000400459-mapping.dmp
-
memory/2032-23-0x0000000000290000-0x00000000002B6000-memory.dmpFilesize
152KB
-
memory/2032-27-0x00000000005E0000-0x0000000000606000-memory.dmpFilesize
152KB
-
memory/2032-29-0x00000000005E0000-0x0000000000606000-memory.dmpFilesize
152KB
-
memory/2032-32-0x00000000005E0000-0x0000000000606000-memory.dmpFilesize
152KB
-
memory/2032-34-0x00000000005E0000-0x0000000000606000-memory.dmpFilesize
152KB
-
memory/2032-36-0x00000000005E0000-0x0000000000606000-memory.dmpFilesize
152KB
-
memory/2032-39-0x00000000005E0000-0x0000000000606000-memory.dmpFilesize
152KB
-
memory/2032-41-0x00000000005E0000-0x0000000000606000-memory.dmpFilesize
152KB
-
memory/2032-73-0x00000000005E0000-0x0000000000606000-memory.dmpFilesize
152KB
-
memory/2032-19-0x000000000040B41E-mapping.dmp