Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
19-07-2020 17:36
Static task
static1
Behavioral task
behavioral1
Sample
vmzeus_3.3.1.0.vir.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
vmzeus_3.3.1.0.vir.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
vmzeus_3.3.1.0.vir.exe
-
Size
300KB
-
MD5
c780cfbc40a338933120ec9efd6d6a0a
-
SHA1
63025be073538fbe61af35e70ae22918bfc172e5
-
SHA256
05fe1601534d962e745acf8c0c577a2dbf87be8e62ea6672be043605d5906716
-
SHA512
c35f2cd5be20fa9f82e24cb852d0d10a63df4e5f4aad09456c5fe28b5f5bde432939b1b998201c8bbfbe36d40fe42da2a25517bdc4716eca782a3887d2ec7d4b
Score
8/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
vmzeus_3.3.1.0.vir.exetrayMicrosoft.exepid process 2016 vmzeus_3.3.1.0.vir.exe 2792 trayMicrosoft.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
vmzeus_3.3.1.0.vir.exevmzeus_3.3.1.0.vir.exetrayMicrosoft.exedescription pid process target process PID 2016 wrote to memory of 2152 2016 vmzeus_3.3.1.0.vir.exe vmzeus_3.3.1.0.vir.exe PID 2016 wrote to memory of 2152 2016 vmzeus_3.3.1.0.vir.exe vmzeus_3.3.1.0.vir.exe PID 2016 wrote to memory of 2152 2016 vmzeus_3.3.1.0.vir.exe vmzeus_3.3.1.0.vir.exe PID 2016 wrote to memory of 2152 2016 vmzeus_3.3.1.0.vir.exe vmzeus_3.3.1.0.vir.exe PID 2016 wrote to memory of 2152 2016 vmzeus_3.3.1.0.vir.exe vmzeus_3.3.1.0.vir.exe PID 2016 wrote to memory of 2152 2016 vmzeus_3.3.1.0.vir.exe vmzeus_3.3.1.0.vir.exe PID 2016 wrote to memory of 2152 2016 vmzeus_3.3.1.0.vir.exe vmzeus_3.3.1.0.vir.exe PID 2016 wrote to memory of 2152 2016 vmzeus_3.3.1.0.vir.exe vmzeus_3.3.1.0.vir.exe PID 2152 wrote to memory of 2792 2152 vmzeus_3.3.1.0.vir.exe trayMicrosoft.exe PID 2152 wrote to memory of 2792 2152 vmzeus_3.3.1.0.vir.exe trayMicrosoft.exe PID 2152 wrote to memory of 2792 2152 vmzeus_3.3.1.0.vir.exe trayMicrosoft.exe PID 2792 wrote to memory of 3940 2792 trayMicrosoft.exe trayMicrosoft.exe PID 2792 wrote to memory of 3940 2792 trayMicrosoft.exe trayMicrosoft.exe PID 2792 wrote to memory of 3940 2792 trayMicrosoft.exe trayMicrosoft.exe PID 2792 wrote to memory of 3940 2792 trayMicrosoft.exe trayMicrosoft.exe PID 2792 wrote to memory of 3940 2792 trayMicrosoft.exe trayMicrosoft.exe PID 2792 wrote to memory of 3940 2792 trayMicrosoft.exe trayMicrosoft.exe PID 2792 wrote to memory of 3940 2792 trayMicrosoft.exe trayMicrosoft.exe PID 2792 wrote to memory of 3940 2792 trayMicrosoft.exe trayMicrosoft.exe PID 2152 wrote to memory of 2556 2152 vmzeus_3.3.1.0.vir.exe cmd.exe PID 2152 wrote to memory of 2556 2152 vmzeus_3.3.1.0.vir.exe cmd.exe PID 2152 wrote to memory of 2556 2152 vmzeus_3.3.1.0.vir.exe cmd.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
vmzeus_3.3.1.0.vir.exetrayMicrosoft.exedescription pid process target process PID 2016 set thread context of 2152 2016 vmzeus_3.3.1.0.vir.exe vmzeus_3.3.1.0.vir.exe PID 2792 set thread context of 3940 2792 trayMicrosoft.exe trayMicrosoft.exe -
Executes dropped EXE 2 IoCs
Processes:
trayMicrosoft.exetrayMicrosoft.exepid process 2792 trayMicrosoft.exe 3940 trayMicrosoft.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
trayMicrosoft.exepid process 3940 trayMicrosoft.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
trayMicrosoft.exepid process 3940 trayMicrosoft.exe 3940 trayMicrosoft.exe 3940 trayMicrosoft.exe 3940 trayMicrosoft.exe 3940 trayMicrosoft.exe 3940 trayMicrosoft.exe 3940 trayMicrosoft.exe 3940 trayMicrosoft.exe 3940 trayMicrosoft.exe 3940 trayMicrosoft.exe 3940 trayMicrosoft.exe 3940 trayMicrosoft.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
vmzeus_3.3.1.0.vir.exetrayMicrosoft.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\WINE vmzeus_3.3.1.0.vir.exe Key opened \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\WINE trayMicrosoft.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
trayMicrosoft.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\Currentversion\Run trayMicrosoft.exe Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D3D2488E-FDB6-81E0-9838-3AE5F8187D7D} = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\trayMicrosoft.exe" trayMicrosoft.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\vmzeus_3.3.1.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\vmzeus_3.3.1.0.vir.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\vmzeus_3.3.1.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\vmzeus_3.3.1.0.vir.exe"2⤵
- Suspicious use of WriteProcessMemory
- Identifies Wine through registry keys
-
C:\Users\Admin\AppData\Roaming\Microsoft\trayMicrosoft.exe"C:\Users\Admin\AppData\Roaming\Microsoft\trayMicrosoft.exe"3⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft\trayMicrosoft.exe"C:\Users\Admin\AppData\Roaming\Microsoft\trayMicrosoft.exe"4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious behavior: EnumeratesProcesses
- Identifies Wine through registry keys
- Adds Run key to start application
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp8a375e96.bat"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp8a375e96.bat
-
C:\Users\Admin\AppData\Roaming\Microsoft\trayMicrosoft.exe
-
C:\Users\Admin\AppData\Roaming\Microsoft\trayMicrosoft.exe
-
C:\Users\Admin\AppData\Roaming\Microsoft\trayMicrosoft.exe
-
memory/2016-2-0x000000000056A000-0x000000000056B000-memory.dmpFilesize
4KB
-
memory/2152-3-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/2152-4-0x00000000004116D7-mapping.dmp
-
memory/2152-5-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/2556-15-0x0000000000000000-mapping.dmp
-
memory/2792-6-0x0000000000000000-mapping.dmp
-
memory/2792-11-0x000000000058A000-0x000000000058B000-memory.dmpFilesize
4KB
-
memory/3940-13-0x00000000004116D7-mapping.dmp