Analysis
-
max time kernel
79s -
max time network
79s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
26-11-2020 15:14
Static task
static1
Behavioral task
behavioral1
Sample
zergb.exe
Resource
win7v20201028
General
-
Target
zergb.exe
-
Size
808KB
-
MD5
d3dee81cd147380fc01723cd3acb0cee
-
SHA1
b26c8f5eca80140a68665447bd2a463feb38cfa5
-
SHA256
63c4e17fa9b6d87a9f4b68b854cae50e95f8de2a86929fecb8f34af0d15798e7
-
SHA512
ad500e7070b17275312d58cca71618ef18a94efc9dd34a8933945cd1c09b67485dc22bf26f342bdc0e35449790600193f0b4ebd72c10a2aea37cd67ffad29bb8
Malware Config
Signatures
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\AnonFileApi.dll vmprotect -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1520 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
zergb.exepid process 292 zergb.exe 292 zergb.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
zergb.exedescription pid process target process PID 292 set thread context of 764 292 zergb.exe zergb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1096 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1620 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
zergb.exepid process 292 zergb.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
zergb.exezergb.exetaskkill.exedescription pid process Token: SeDebugPrivilege 292 zergb.exe Token: SeTakeOwnershipPrivilege 292 zergb.exe Token: SeRestorePrivilege 292 zergb.exe Token: SeDebugPrivilege 764 zergb.exe Token: SeDebugPrivilege 1620 taskkill.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
zergb.exezergb.execmd.exedescription pid process target process PID 292 wrote to memory of 764 292 zergb.exe zergb.exe PID 292 wrote to memory of 764 292 zergb.exe zergb.exe PID 292 wrote to memory of 764 292 zergb.exe zergb.exe PID 292 wrote to memory of 764 292 zergb.exe zergb.exe PID 292 wrote to memory of 764 292 zergb.exe zergb.exe PID 292 wrote to memory of 764 292 zergb.exe zergb.exe PID 292 wrote to memory of 764 292 zergb.exe zergb.exe PID 292 wrote to memory of 764 292 zergb.exe zergb.exe PID 292 wrote to memory of 764 292 zergb.exe zergb.exe PID 292 wrote to memory of 764 292 zergb.exe zergb.exe PID 292 wrote to memory of 764 292 zergb.exe zergb.exe PID 292 wrote to memory of 764 292 zergb.exe zergb.exe PID 764 wrote to memory of 1520 764 zergb.exe cmd.exe PID 764 wrote to memory of 1520 764 zergb.exe cmd.exe PID 764 wrote to memory of 1520 764 zergb.exe cmd.exe PID 764 wrote to memory of 1520 764 zergb.exe cmd.exe PID 1520 wrote to memory of 796 1520 cmd.exe chcp.com PID 1520 wrote to memory of 796 1520 cmd.exe chcp.com PID 1520 wrote to memory of 796 1520 cmd.exe chcp.com PID 1520 wrote to memory of 796 1520 cmd.exe chcp.com PID 1520 wrote to memory of 1620 1520 cmd.exe taskkill.exe PID 1520 wrote to memory of 1620 1520 cmd.exe taskkill.exe PID 1520 wrote to memory of 1620 1520 cmd.exe taskkill.exe PID 1520 wrote to memory of 1620 1520 cmd.exe taskkill.exe PID 1520 wrote to memory of 1096 1520 cmd.exe timeout.exe PID 1520 wrote to memory of 1096 1520 cmd.exe timeout.exe PID 1520 wrote to memory of 1096 1520 cmd.exe timeout.exe PID 1520 wrote to memory of 1096 1520 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\zergb.exe"C:\Users\Admin\AppData\Local\Temp\zergb.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\zergb.exe"C:\Users\Admin\AppData\Local\Temp\zergb.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp36B2.tmp.bat3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\taskkill.exeTaskKill /F /IM 7644⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exeTimeout /T 2 /Nobreak4⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\AnonFileApi.dllMD5
7a2d5deab61f043394a510f4e2c0866f
SHA1ca16110c9cf6522cd7bea32895fd0f697442849b
SHA25675db945388f62f2de3d3eaae911f49495f289244e2fec9b25455c2d686989f69
SHA512b66b0bf227762348a5ede3c2578d5bc089c222f632a705241bcc63d56620bef238c67ca2bd400ba7874b2bc168e279673b0e105b73282bc69aa21a7fd34bafe0
-
C:\Users\Admin\AppData\Local\Temp\DotNetZip.dllMD5
6d1c62ec1c2ef722f49b2d8dd4a4df16
SHA11bb08a979b7987bc7736a8cfa4779383cb0ecfa6
SHA25600da1597d92235d3f84da979e2fa5dbf049bafb52c33bd6fc8ee7b29570c124c
SHA512c0dce8eaa52eb6c319d4be2eec4622bb3380c65b659cfb77ff51a4ada7d3e591e791ee823dad67b5556ffac5c060ff45d09dd1cc21baaf70ba89806647cb3bd2
-
C:\Users\Admin\AppData\Local\Temp\tmp36B2.tmp.batMD5
c9e3e086a4253822b9c90a008d270052
SHA1b4b06dc1cc3fa3b5125cc47420f7e0e2aa944185
SHA256d528578e33f628671351a27e853c263b561dfc9b47f5af06c01318c22e0a6303
SHA512479968bab5903579c68d36f3b5d1e2b3ab685efa8541af08465aeb3ea757e8d7f16481c5a3ef1c46a735b7bc0238eb75929738c872e4a053685628e0e0b019d3
-
\Users\Admin\AppData\Local\Temp\b35bc50e-fc56-4239-a7d0-bb79118b31c9\AgileDotNetRT.dllMD5
14ff402962ad21b78ae0b4c43cd1f194
SHA1f8a510eb26666e875a5bdd1cadad40602763ad72
SHA256fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b
SHA512daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b
-
\Users\Admin\AppData\Local\Temp\e34dd831-6d57-4d92-81ec-c008864dca6e\AgileDotNetRT.dllMD5
14ff402962ad21b78ae0b4c43cd1f194
SHA1f8a510eb26666e875a5bdd1cadad40602763ad72
SHA256fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b
SHA512daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b
-
memory/292-5-0x0000000001F00000-0x0000000001F16000-memory.dmpFilesize
88KB
-
memory/292-0-0x00000000748D0000-0x0000000074FBE000-memory.dmpFilesize
6.9MB
-
memory/292-3-0x0000000001E80000-0x0000000001EB2000-memory.dmpFilesize
200KB
-
memory/292-1-0x00000000002F0000-0x00000000002F1000-memory.dmpFilesize
4KB
-
memory/764-7-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/764-8-0x0000000000424006-mapping.dmp
-
memory/764-9-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/764-10-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/764-11-0x00000000748D0000-0x0000000074FBE000-memory.dmpFilesize
6.9MB
-
memory/796-16-0x0000000000000000-mapping.dmp
-
memory/1096-18-0x0000000000000000-mapping.dmp
-
memory/1520-14-0x0000000000000000-mapping.dmp
-
memory/1620-17-0x0000000000000000-mapping.dmp