Analysis
-
max time kernel
48s -
max time network
19s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
15-01-2021 07:15
Static task
static1
Behavioral task
behavioral1
Sample
zff.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
zff.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
zff.exe
-
Size
847KB
-
MD5
0ed4cfe2f4a7502eb706a6ca9d5234c4
-
SHA1
bf2eb1aa835f79d8a105fa29872025ad104cba08
-
SHA256
99becf56c35d26373e199fdeba79ee2b51eaf5c761b651136b5007af09e140ea
-
SHA512
1a54618d883a527f4f96ccb4b28020f48c3c8318fd0ff2ec454da4a12e31ce2eda05f9653f04b15479c8e8a789c977905b562465351693728e165025e60a7849
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
zff.exepid process 1204 zff.exe 1204 zff.exe 1204 zff.exe 1204 zff.exe 1204 zff.exe 1204 zff.exe 1204 zff.exe 1204 zff.exe 1204 zff.exe 1204 zff.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
zff.exedescription pid process Token: SeDebugPrivilege 1204 zff.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
zff.exedescription pid process target process PID 1204 wrote to memory of 1528 1204 zff.exe zff.exe PID 1204 wrote to memory of 1528 1204 zff.exe zff.exe PID 1204 wrote to memory of 1528 1204 zff.exe zff.exe PID 1204 wrote to memory of 1528 1204 zff.exe zff.exe PID 1204 wrote to memory of 1508 1204 zff.exe zff.exe PID 1204 wrote to memory of 1508 1204 zff.exe zff.exe PID 1204 wrote to memory of 1508 1204 zff.exe zff.exe PID 1204 wrote to memory of 1508 1204 zff.exe zff.exe PID 1204 wrote to memory of 1572 1204 zff.exe zff.exe PID 1204 wrote to memory of 1572 1204 zff.exe zff.exe PID 1204 wrote to memory of 1572 1204 zff.exe zff.exe PID 1204 wrote to memory of 1572 1204 zff.exe zff.exe PID 1204 wrote to memory of 1496 1204 zff.exe zff.exe PID 1204 wrote to memory of 1496 1204 zff.exe zff.exe PID 1204 wrote to memory of 1496 1204 zff.exe zff.exe PID 1204 wrote to memory of 1496 1204 zff.exe zff.exe PID 1204 wrote to memory of 316 1204 zff.exe zff.exe PID 1204 wrote to memory of 316 1204 zff.exe zff.exe PID 1204 wrote to memory of 316 1204 zff.exe zff.exe PID 1204 wrote to memory of 316 1204 zff.exe zff.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\zff.exe"C:\Users\Admin\AppData\Local\Temp\zff.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\zff.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zff.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zff.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zff.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\zff.exe"{path}"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1204-2-0x00000000740B0000-0x000000007479E000-memory.dmpFilesize
6.9MB
-
memory/1204-3-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB
-
memory/1204-5-0x00000000005C0000-0x00000000005CE000-memory.dmpFilesize
56KB
-
memory/1204-6-0x00000000051D0000-0x000000000528E000-memory.dmpFilesize
760KB