Analysis
-
max time kernel
126s -
max time network
185s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
13-07-2021 08:16
Static task
static1
Behavioral task
behavioral1
Sample
zeusvm_test002.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
zeusvm_test002.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
zeusvm_test002.exe
-
Size
1.4MB
-
MD5
05dfc8f126418c77521ff45f607257af
-
SHA1
a784ca3c97a83532cf2a2d497365fa8e7fe353cf
-
SHA256
1aab662435a6a2aeadf54ab5c31dbc6560dd4c9332769ed968e3ccf77ae8da68
-
SHA512
1b2d930388c86edc62d7a3614779ed9e04ad1ed0382619f70e470cc1b9faf3a7248c17d6675620c1ba5a9d802d41b533db65435abfda6a567a9b5745fa9288e6
Score
8/10
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1796 luminos.exe 1576 Pony.exe 1628 bot.exe 1760 ywve.exe -
resource yara_rule behavioral1/files/0x00040000000130d6-67.dat upx behavioral1/files/0x00040000000130d6-68.dat upx behavioral1/files/0x00040000000130d6-70.dat upx -
Loads dropped DLL 10 IoCs
pid Process 468 zeusvm_test002.exe 468 zeusvm_test002.exe 468 zeusvm_test002.exe 468 zeusvm_test002.exe 468 zeusvm_test002.exe 468 zeusvm_test002.exe 1628 bot.exe 1628 bot.exe 1584 dw20.exe 1584 dw20.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\Currentversion\Run explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 468 set thread context of 1952 468 zeusvm_test002.exe 33 PID 1628 set thread context of 692 1628 bot.exe 41 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\6252DC40F71143A22FDE9EF7348E064251B18118 zeusvm_test002.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\6252DC40F71143A22FDE9EF7348E064251B18118\Blob = 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 zeusvm_test002.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\6252DC40F71143A22FDE9EF7348E064251B18118\Blob = 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 zeusvm_test002.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\6252DC40F71143A22FDE9EF7348E064251B18118\Blob = 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 zeusvm_test002.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\7DFD5D82-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1760 ywve.exe 1760 ywve.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2036 dw20.exe 1584 dw20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1628 bot.exe Token: SeManageVolumePrivilege 2044 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2044 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2044 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2044 WinMail.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 468 wrote to memory of 1796 468 zeusvm_test002.exe 29 PID 468 wrote to memory of 1796 468 zeusvm_test002.exe 29 PID 468 wrote to memory of 1796 468 zeusvm_test002.exe 29 PID 468 wrote to memory of 1796 468 zeusvm_test002.exe 29 PID 468 wrote to memory of 1576 468 zeusvm_test002.exe 30 PID 468 wrote to memory of 1576 468 zeusvm_test002.exe 30 PID 468 wrote to memory of 1576 468 zeusvm_test002.exe 30 PID 468 wrote to memory of 1576 468 zeusvm_test002.exe 30 PID 468 wrote to memory of 1628 468 zeusvm_test002.exe 31 PID 468 wrote to memory of 1628 468 zeusvm_test002.exe 31 PID 468 wrote to memory of 1628 468 zeusvm_test002.exe 31 PID 468 wrote to memory of 1628 468 zeusvm_test002.exe 31 PID 1628 wrote to memory of 1760 1628 bot.exe 32 PID 1628 wrote to memory of 1760 1628 bot.exe 32 PID 1628 wrote to memory of 1760 1628 bot.exe 32 PID 1628 wrote to memory of 1760 1628 bot.exe 32 PID 468 wrote to memory of 1952 468 zeusvm_test002.exe 33 PID 468 wrote to memory of 1952 468 zeusvm_test002.exe 33 PID 468 wrote to memory of 1952 468 zeusvm_test002.exe 33 PID 468 wrote to memory of 1952 468 zeusvm_test002.exe 33 PID 468 wrote to memory of 1952 468 zeusvm_test002.exe 33 PID 468 wrote to memory of 1952 468 zeusvm_test002.exe 33 PID 468 wrote to memory of 1952 468 zeusvm_test002.exe 33 PID 468 wrote to memory of 1952 468 zeusvm_test002.exe 33 PID 468 wrote to memory of 1952 468 zeusvm_test002.exe 33 PID 1760 wrote to memory of 548 1760 ywve.exe 34 PID 1760 wrote to memory of 548 1760 ywve.exe 34 PID 1760 wrote to memory of 548 1760 ywve.exe 34 PID 1760 wrote to memory of 548 1760 ywve.exe 34 PID 1760 wrote to memory of 548 1760 ywve.exe 34 PID 1760 wrote to memory of 548 1760 ywve.exe 34 PID 1760 wrote to memory of 548 1760 ywve.exe 34 PID 1760 wrote to memory of 548 1760 ywve.exe 34 PID 1760 wrote to memory of 548 1760 ywve.exe 34 PID 1760 wrote to memory of 548 1760 ywve.exe 34 PID 548 wrote to memory of 1200 548 explorer.exe 15 PID 548 wrote to memory of 1200 548 explorer.exe 15 PID 548 wrote to memory of 1200 548 explorer.exe 15 PID 1796 wrote to memory of 1584 1796 luminos.exe 38 PID 1796 wrote to memory of 1584 1796 luminos.exe 38 PID 1796 wrote to memory of 1584 1796 luminos.exe 38 PID 1796 wrote to memory of 1584 1796 luminos.exe 38 PID 1952 wrote to memory of 2036 1952 zeusvm_test002.exe 40 PID 1952 wrote to memory of 2036 1952 zeusvm_test002.exe 40 PID 1952 wrote to memory of 2036 1952 zeusvm_test002.exe 40 PID 1952 wrote to memory of 2036 1952 zeusvm_test002.exe 40 PID 1760 wrote to memory of 1796 1760 ywve.exe 29 PID 1760 wrote to memory of 1796 1760 ywve.exe 29 PID 1760 wrote to memory of 1796 1760 ywve.exe 29 PID 1760 wrote to memory of 1796 1760 ywve.exe 29 PID 1760 wrote to memory of 1796 1760 ywve.exe 29 PID 1760 wrote to memory of 1796 1760 ywve.exe 29 PID 1760 wrote to memory of 1576 1760 ywve.exe 30 PID 1760 wrote to memory of 1576 1760 ywve.exe 30 PID 1760 wrote to memory of 1576 1760 ywve.exe 30 PID 1760 wrote to memory of 1576 1760 ywve.exe 30 PID 1760 wrote to memory of 1576 1760 ywve.exe 30 PID 1760 wrote to memory of 1576 1760 ywve.exe 30 PID 1760 wrote to memory of 1628 1760 ywve.exe 31 PID 1760 wrote to memory of 1628 1760 ywve.exe 31 PID 1760 wrote to memory of 1628 1760 ywve.exe 31 PID 1760 wrote to memory of 1628 1760 ywve.exe 31 PID 1760 wrote to memory of 1628 1760 ywve.exe 31 PID 1760 wrote to memory of 1628 1760 ywve.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\zeusvm_test002.exe"C:\Users\Admin\AppData\Local\Temp\zeusvm_test002.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Roaming\luminos.exe"C:\Users\Admin\AppData\Roaming\luminos.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7684⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:1584
-
-
-
C:\Users\Admin\AppData\Roaming\Pony.exe"C:\Users\Admin\AppData\Roaming\Pony.exe"3⤵
- Executes dropped EXE
PID:1576
-
-
C:\Users\Admin\AppData\Roaming\bot.exe"C:\Users\Admin\AppData\Roaming\bot.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Roaming\Unsuu\ywve.exe"C:\Users\Admin\AppData\Roaming\Unsuu\ywve.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"5⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:548
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpcd401a03.bat"4⤵PID:692
-
-
-
C:\Users\Admin\AppData\Local\Temp\zeusvm_test002.exe"C:\Users\Admin\AppData\Local\Temp\zeusvm_test002.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7724⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:2036
-
-
-
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2044