Analysis
-
max time kernel
560s -
max time network
576s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-12-2020 15:31
Static task
static1
Behavioral task
behavioral1
Sample
243_BIO_SINOPHARM.exe
Resource
win7v20201028
0 signatures
0 seconds
General
-
Target
243_BIO_SINOPHARM.exe
-
Size
4.7MB
-
MD5
49a34cfbeed733c24392c9217ef46bb6
-
SHA1
fbe27e84dd553477894242844652a30eb7d713bc
-
SHA256
f36a0ee7f4ec23765bb28fbfa734e402042278864e246a54b8c4db6f58275662
-
SHA512
bc939a0b0c8472a3388ccbf298983d6d720e1c740f0f61008713a357b909743e3b1bb3b618f048a25fb95b8b5d8d159e593e5876a4bed0f0e95c7ffa9783ebcd
Score
10/10
Malware Config
Extracted
Family
zebrocy
C2
/managment/cb-secure/technology.php
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 724 ndfapi.exe -
Deletes itself 1 IoCs
pid Process 1788 cmd.exe -
JavaScript code in executable 2 IoCs
resource yara_rule behavioral1/files/0x00040000000130d6-5.dat js behavioral1/files/0x00040000000130d6-16.dat js -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1832 schtasks.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1944 PING.EXE 1012 PING.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeBackupPrivilege 1452 robocopy.exe Token: SeRestorePrivilege 1452 robocopy.exe Token: SeSecurityPrivilege 1452 robocopy.exe Token: SeTakeOwnershipPrivilege 1452 robocopy.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1452 1744 243_BIO_SINOPHARM.exe 26 PID 1744 wrote to memory of 1452 1744 243_BIO_SINOPHARM.exe 26 PID 1744 wrote to memory of 1452 1744 243_BIO_SINOPHARM.exe 26 PID 1744 wrote to memory of 1452 1744 243_BIO_SINOPHARM.exe 26 PID 1744 wrote to memory of 1996 1744 243_BIO_SINOPHARM.exe 28 PID 1744 wrote to memory of 1996 1744 243_BIO_SINOPHARM.exe 28 PID 1744 wrote to memory of 1996 1744 243_BIO_SINOPHARM.exe 28 PID 1744 wrote to memory of 1996 1744 243_BIO_SINOPHARM.exe 28 PID 1996 wrote to memory of 1848 1996 cmd.exe 30 PID 1996 wrote to memory of 1848 1996 cmd.exe 30 PID 1996 wrote to memory of 1848 1996 cmd.exe 30 PID 1996 wrote to memory of 1848 1996 cmd.exe 30 PID 1848 wrote to memory of 1788 1848 forfiles.exe 31 PID 1848 wrote to memory of 1788 1848 forfiles.exe 31 PID 1848 wrote to memory of 1788 1848 forfiles.exe 31 PID 1848 wrote to memory of 1788 1848 forfiles.exe 31 PID 1788 wrote to memory of 1832 1788 cmd.exe 32 PID 1788 wrote to memory of 1832 1788 cmd.exe 32 PID 1788 wrote to memory of 1832 1788 cmd.exe 32 PID 1788 wrote to memory of 1832 1788 cmd.exe 32 PID 1788 wrote to memory of 1864 1788 cmd.exe 33 PID 1788 wrote to memory of 1864 1788 cmd.exe 33 PID 1788 wrote to memory of 1864 1788 cmd.exe 33 PID 1788 wrote to memory of 1864 1788 cmd.exe 33 PID 1864 wrote to memory of 1944 1864 cmd.exe 34 PID 1864 wrote to memory of 1944 1864 cmd.exe 34 PID 1864 wrote to memory of 1944 1864 cmd.exe 34 PID 1864 wrote to memory of 1944 1864 cmd.exe 34 PID 1788 wrote to memory of 1120 1788 cmd.exe 38 PID 1788 wrote to memory of 1120 1788 cmd.exe 38 PID 1788 wrote to memory of 1120 1788 cmd.exe 38 PID 1788 wrote to memory of 1120 1788 cmd.exe 38 PID 1120 wrote to memory of 1012 1120 cmd.exe 39 PID 1120 wrote to memory of 1012 1120 cmd.exe 39 PID 1120 wrote to memory of 1012 1120 cmd.exe 39 PID 1120 wrote to memory of 1012 1120 cmd.exe 39 PID 616 wrote to memory of 724 616 taskeng.exe 41 PID 616 wrote to memory of 724 616 taskeng.exe 41 PID 616 wrote to memory of 724 616 taskeng.exe 41 PID 616 wrote to memory of 724 616 taskeng.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\243_BIO_SINOPHARM.exe"C:\Users\Admin\AppData\Local\Temp\243_BIO_SINOPHARM.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\robocopy.exerobocopy C:\Users\Admin\AppData\Local\Temp\ C:\Users\Admin\AppData\Roaming\LigoBar\ *.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1452
-
-
C:\Windows\SysWOW64\cmd.execmd.exe "/C forfiles /p c:\windows\system32 /m notepad.exe /C C:\Users\Admin\AppData\Roaming\LigoBar\stom.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m notepad.exe /C C:\Users\Admin\AppData\Roaming\LigoBar\stom.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Roaming\LigoBar\stom.bat"4⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1788 -
\??\c:\windows\SysWOW64\schtasks.exeschtasks /Create /SC MINUTE /MO 3 /TN SoftwareProtectionPlatform /F /TR "C:\Users\Admin\AppData\Roaming\LigoBar\ndfapi.exe"5⤵
- Creates scheduled task(s)
PID:1832
-
-
\??\c:\windows\SysWOW64\cmd.execmd.exe /C ping localhost -n 35⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
\??\c:\windows\SysWOW64\PING.EXEping localhost -n 36⤵
- Runs ping.exe
PID:1944
-
-
-
\??\c:\windows\SysWOW64\cmd.execmd.exe /C ping localhost -n 75⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
\??\c:\windows\SysWOW64\PING.EXEping localhost -n 76⤵
- Runs ping.exe
PID:1012
-
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {5D311F18-D70E-42E9-8E36-16BA81045A21} S-1-5-21-3825035466-2522850611-591511364-1000:EIDQHRRL\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Users\Admin\AppData\Roaming\LigoBar\ndfapi.exeC:\Users\Admin\AppData\Roaming\LigoBar\ndfapi.exe2⤵
- Executes dropped EXE
PID:724
-