Analysis

  • max time kernel
    1604s
  • max time network
    1616s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    07-05-2022 05:55

General

  • Target

    update.exe

  • Size

    5.5MB

  • MD5

    0c102c54f0ad17c2cdd9c89c5c3f3cf7

  • SHA1

    844fab5d39fc17eef2f7a1dc3be91ead3150c857

  • SHA256

    eece013ca6b8ce18ad9dfafa95689aa683586aa812d911457e97b0cff6db5113

  • SHA512

    62a9d1338bce7a83e4e4258920b7a35d3263e7a2e356824d12c0b3b9ebd124d7e0a58bc7fb516a3733c668d7d25b39c2814ed7e0c810b4fac30ac08e53f5a675

Malware Config

Signatures

  • Zebrocy

    Zebrocy is a backdoor created by Sofacy threat group and has multiple variants developed in different languages.

  • Zebrocy Go Variant 2 IoCs
  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 4 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\update.exe
    "C:\Users\Admin\AppData\Local\Temp\update.exe"
    1⤵
    • Modifies extensions of user files
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    PID:960
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:320

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/960-54-0x00000000769D1000-0x00000000769D3000-memory.dmp

    Filesize

    8KB

  • memory/960-55-0x0000000000400000-0x0000000000FEF000-memory.dmp

    Filesize

    11.9MB

  • memory/960-57-0x0000000000400000-0x0000000000FEF000-memory.dmp

    Filesize

    11.9MB