Analysis

  • max time kernel
    125s
  • max time network
    126s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    19-07-2020 19:46

General

  • Target

    zeus 1_1.3.2.1.vir.exe

  • Size

    116KB

  • MD5

    6c2d8d645f55e92eff8e1e2d8a065bff

  • SHA1

    929a5ebdcf4c00d8365f5b7da01e5d3192f382c5

  • SHA256

    66114ad746cfa51414a75a808c7dcde250c15fbd63289c589449658068a73418

  • SHA512

    88615fe49e2399477b0ce5dea48642ce6870582dfe9a35ebf8a4ea93ddf3a7259503ab35c92b42a6f7616e8a08a18f49829f49e12b490bbb9935fe95dcf6e767

Score
5/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Suspicious use of SetThreadContext 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\zeus 1_1.3.2.1.vir.exe
    "C:\Users\Admin\AppData\Local\Temp\zeus 1_1.3.2.1.vir.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetThreadContext
    PID:3908
    • C:\Users\Admin\AppData\Local\Temp\zeus 1_1.3.2.1.vir.exe
      "C:\Users\Admin\AppData\Local\Temp\zeus 1_1.3.2.1.vir.exe"
      2⤵
        PID:3880
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 548
          3⤵
          • Program crash
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious behavior: EnumeratesProcesses
          PID:3556

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3556-4-0x0000000004A50000-0x0000000004A51000-memory.dmp
      Filesize

      4KB

    • memory/3556-8-0x0000000005180000-0x0000000005181000-memory.dmp
      Filesize

      4KB

    • memory/3880-0-0x0000000000400000-0x0000000000421000-memory.dmp
      Filesize

      132KB

    • memory/3880-1-0x0000000000400000-0x0000000000421000-memory.dmp
      Filesize

      132KB

    • memory/3880-2-0x0000000000407084-mapping.dmp
    • memory/3880-3-0x0000000000400000-0x0000000000421000-memory.dmp
      Filesize

      132KB

    • memory/3880-5-0x0000000000407084-mapping.dmp
    • memory/3880-6-0x0000000000407084-mapping.dmp
    • memory/3880-7-0x0000000000407084-mapping.dmp