Overview
overview
10Static
static
810c410851b...78.exe
windows7_x64
110c410851b...78.exe
windows10_x64
1Bat-To-Exe...er-x64
linux_amd64
Bat-To-Exe...er-x64
linux_mipsel
Bat-To-Exe...er-x64
linux_mips
Bat-To-Exe...er-x86
linux_amd64
Bat-To-Exe...er-x86
linux_mipsel
Bat-To-Exe...er-x86
linux_mips
Bat-To-Exe...er.dmg
macos_amd64
1Bat-To-Exe...64.exe
windows7_x64
3Bat-To-Exe...64.exe
windows10_x64
1Bat-To-Exe...86.exe
windows7_x64
3Bat-To-Exe...86.exe
windows10_x64
125ac59efdf...c7.exe
windows7_x64
1025ac59efdf...c7.exe
windows10_x64
83523671dc7...2a.exe
windows7_x64
83523671dc7...2a.exe
windows10_x64
84a32ef4d91...8a.exe
windows7_x64
84a32ef4d91...8a.exe
windows10_x64
86f081f8143...3b.exe
windows7_x64
86f081f8143...3b.exe
windows10_x64
879b2065107...61.exe
windows7_x64
879b2065107...61.exe
windows10_x64
8baa54f7d1e...d8.exe
windows7_x64
8baa54f7d1e...d8.exe
windows10_x64
8Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
25-10-2021 08:18
Static task
static1
Behavioral task
behavioral1
Sample
10c410851b47490eea158797046a2be886dbf7f7da4f47a7fa4e8081af6f2f78.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
10c410851b47490eea158797046a2be886dbf7f7da4f47a7fa4e8081af6f2f78.exe
Resource
win10-en-20211014
Behavioral task
behavioral3
Sample
Bat-To-Exe-Converter-Downloader-master/Linux/downloader-x64
Resource
ubuntu-amd64
Behavioral task
behavioral4
Sample
Bat-To-Exe-Converter-Downloader-master/Linux/downloader-x64
Resource
debian9-mipsel
Behavioral task
behavioral5
Sample
Bat-To-Exe-Converter-Downloader-master/Linux/downloader-x64
Resource
debian9-mipsbe
Behavioral task
behavioral6
Sample
Bat-To-Exe-Converter-Downloader-master/Linux/downloader-x86
Resource
ubuntu-amd64
Behavioral task
behavioral7
Sample
Bat-To-Exe-Converter-Downloader-master/Linux/downloader-x86
Resource
debian9-mipsel
Behavioral task
behavioral8
Sample
Bat-To-Exe-Converter-Downloader-master/Linux/downloader-x86
Resource
debian9-mipsbe
Behavioral task
behavioral9
Sample
Bat-To-Exe-Converter-Downloader-master/Mac OS/downloader.dmg
Resource
macos
Behavioral task
behavioral10
Sample
Bat-To-Exe-Converter-Downloader-master/Windows/downloader-x64.exe
Resource
win7-en-20210920
Behavioral task
behavioral11
Sample
Bat-To-Exe-Converter-Downloader-master/Windows/downloader-x64.exe
Resource
win10-en-20211014
Behavioral task
behavioral12
Sample
Bat-To-Exe-Converter-Downloader-master/Windows/downloader-x86.exe
Resource
win7-en-20210920
Behavioral task
behavioral13
Sample
Bat-To-Exe-Converter-Downloader-master/Windows/downloader-x86.exe
Resource
win10-en-20211014
Behavioral task
behavioral14
Sample
25ac59efdfd4db2857bd58ebb437dfe9c5d55edfbbbadaaaf27b0f631d3325c7.exe
Resource
win7-en-20210920
Behavioral task
behavioral15
Sample
25ac59efdfd4db2857bd58ebb437dfe9c5d55edfbbbadaaaf27b0f631d3325c7.exe
Resource
win10-en-20211014
Behavioral task
behavioral16
Sample
3523671dc78bc32e8caf574110eb09023588eb0a9edb91eb7f6afc7c762d332a.exe
Resource
win7-en-20210920
Behavioral task
behavioral17
Sample
3523671dc78bc32e8caf574110eb09023588eb0a9edb91eb7f6afc7c762d332a.exe
Resource
win10-en-20210920
Behavioral task
behavioral18
Sample
4a32ef4d911a823aaeac64664a8f9e28890bbd20da689580802e23d571d0f68a.exe
Resource
win7-en-20211014
Behavioral task
behavioral19
Sample
4a32ef4d911a823aaeac64664a8f9e28890bbd20da689580802e23d571d0f68a.exe
Resource
win10-en-20210920
Behavioral task
behavioral20
Sample
6f081f814358d615469a82cab0569fbf3c98a3e152bcfb2a9dd348b2d881b93b.exe
Resource
win7-en-20211014
Behavioral task
behavioral21
Sample
6f081f814358d615469a82cab0569fbf3c98a3e152bcfb2a9dd348b2d881b93b.exe
Resource
win10-en-20210920
Behavioral task
behavioral22
Sample
79b2065107cb362001a2f8a8cd8e2e20678b2eb2c0372ef760495d9fff407361.exe
Resource
win7-en-20211014
Behavioral task
behavioral23
Sample
79b2065107cb362001a2f8a8cd8e2e20678b2eb2c0372ef760495d9fff407361.exe
Resource
win10-en-20210920
Behavioral task
behavioral24
Sample
baa54f7d1e5215ded677ed42ca7e5f0ab973313cd06f8ee36c77a55894f037d8.exe
Resource
win7-en-20210920
Behavioral task
behavioral25
Sample
baa54f7d1e5215ded677ed42ca7e5f0ab973313cd06f8ee36c77a55894f037d8.exe
Resource
win10-en-20211014
General
-
Target
6f081f814358d615469a82cab0569fbf3c98a3e152bcfb2a9dd348b2d881b93b.exe
-
Size
3.9MB
-
MD5
2eb84e2162837a70e8bdc6c24e8958c5
-
SHA1
86a02a7b5a277df238fcea0af5c0294d8449c43e
-
SHA256
6f081f814358d615469a82cab0569fbf3c98a3e152bcfb2a9dd348b2d881b93b
-
SHA512
b49f6112cb55f947d88eb72bbdad1923f66589daafd218b49e9d0a4665b2aac4fae563f28f556d6b33bdbeba4542bfd87f9c45c968229892d08c54d8f2d06777
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
zeronet-downloader.exepid process 792 zeronet-downloader.exe 1284 -
Loads dropped DLL 3 IoCs
Processes:
6f081f814358d615469a82cab0569fbf3c98a3e152bcfb2a9dd348b2d881b93b.exepid process 1916 6f081f814358d615469a82cab0569fbf3c98a3e152bcfb2a9dd348b2d881b93b.exe 1916 6f081f814358d615469a82cab0569fbf3c98a3e152bcfb2a9dd348b2d881b93b.exe 1284 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
6f081f814358d615469a82cab0569fbf3c98a3e152bcfb2a9dd348b2d881b93b.exepid process 1916 6f081f814358d615469a82cab0569fbf3c98a3e152bcfb2a9dd348b2d881b93b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
6f081f814358d615469a82cab0569fbf3c98a3e152bcfb2a9dd348b2d881b93b.exedescription pid process target process PID 1916 wrote to memory of 792 1916 6f081f814358d615469a82cab0569fbf3c98a3e152bcfb2a9dd348b2d881b93b.exe zeronet-downloader.exe PID 1916 wrote to memory of 792 1916 6f081f814358d615469a82cab0569fbf3c98a3e152bcfb2a9dd348b2d881b93b.exe zeronet-downloader.exe PID 1916 wrote to memory of 792 1916 6f081f814358d615469a82cab0569fbf3c98a3e152bcfb2a9dd348b2d881b93b.exe zeronet-downloader.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f081f814358d615469a82cab0569fbf3c98a3e152bcfb2a9dd348b2d881b93b.exe"C:\Users\Admin\AppData\Local\Temp\6f081f814358d615469a82cab0569fbf3c98a3e152bcfb2a9dd348b2d881b93b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\145B.tmp\zeronet-downloader.exe"C:\Users\Admin\AppData\Local\Temp\145B.tmp\zeronet-downloader.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\145B.tmp\zeronet-downloader.exeMD5
9e0722e16793b9e6ffd8b48f4033a236
SHA1b76ebcc61e0d16a93feca87525966d0c4f571ec3
SHA256b5782642408eb1aa19df1781e8de277e0f586f66632b3171069630651c11e988
SHA512f12b277330eeac8e04d3d5b69b37c690897fc49c6586e4ec9c5aa412cd64c07fd9c4edfe6607d01fa49ec6efb3d594af6277555ce70cf0d970d1c29ef5f04bd9
-
\Users\Admin\AppData\Local\Temp\145B.tmp\zeronet-downloader.exeMD5
9e0722e16793b9e6ffd8b48f4033a236
SHA1b76ebcc61e0d16a93feca87525966d0c4f571ec3
SHA256b5782642408eb1aa19df1781e8de277e0f586f66632b3171069630651c11e988
SHA512f12b277330eeac8e04d3d5b69b37c690897fc49c6586e4ec9c5aa412cd64c07fd9c4edfe6607d01fa49ec6efb3d594af6277555ce70cf0d970d1c29ef5f04bd9
-
\Users\Admin\AppData\Local\Temp\145B.tmp\zeronet-downloader.exeMD5
9e0722e16793b9e6ffd8b48f4033a236
SHA1b76ebcc61e0d16a93feca87525966d0c4f571ec3
SHA256b5782642408eb1aa19df1781e8de277e0f586f66632b3171069630651c11e988
SHA512f12b277330eeac8e04d3d5b69b37c690897fc49c6586e4ec9c5aa412cd64c07fd9c4edfe6607d01fa49ec6efb3d594af6277555ce70cf0d970d1c29ef5f04bd9
-
\Users\Admin\AppData\Local\Temp\145B.tmp\zeronet-downloader.exeMD5
9e0722e16793b9e6ffd8b48f4033a236
SHA1b76ebcc61e0d16a93feca87525966d0c4f571ec3
SHA256b5782642408eb1aa19df1781e8de277e0f586f66632b3171069630651c11e988
SHA512f12b277330eeac8e04d3d5b69b37c690897fc49c6586e4ec9c5aa412cd64c07fd9c4edfe6607d01fa49ec6efb3d594af6277555ce70cf0d970d1c29ef5f04bd9
-
\Users\Admin\AppData\Local\Temp\145B.tmp\zeronet-downloader.exeMD5
9e0722e16793b9e6ffd8b48f4033a236
SHA1b76ebcc61e0d16a93feca87525966d0c4f571ec3
SHA256b5782642408eb1aa19df1781e8de277e0f586f66632b3171069630651c11e988
SHA512f12b277330eeac8e04d3d5b69b37c690897fc49c6586e4ec9c5aa412cd64c07fd9c4edfe6607d01fa49ec6efb3d594af6277555ce70cf0d970d1c29ef5f04bd9
-
memory/792-58-0x0000000000000000-mapping.dmp
-
memory/1916-55-0x000007FEFBB91000-0x000007FEFBB93000-memory.dmpFilesize
8KB