Analysis
-
max time kernel
137s -
max time network
196s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12/05/2022, 16:51
Static task
static1
Behavioral task
behavioral1
Sample
zxcv.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
zxcv.exe
-
Size
100KB
-
MD5
c7a310982da68b10360854f9cd78e718
-
SHA1
60140c28e0b7db797a771c2dee081fa3812246db
-
SHA256
df4876573295b4e7beb618db31a015ea617f61b811978bb168d432c4052f7731
-
SHA512
6747fa3f7637922eeaa0feeb25d430dc6ab66fd9f3d22e7e5fd16bad9b75528a8174c34a8baf681950b64e8cdaa6a14e37633592e843c363e75468622ebd2ec3
Malware Config
Extracted
Family
arkei
Botnet
Default
Signatures
-
suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4
suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Control Panel\International\Geo\Nation zxcv.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1936 set thread context of 916 1936 zxcv.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1936 zxcv.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1936 zxcv.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1936 wrote to memory of 916 1936 zxcv.exe 28 PID 1936 wrote to memory of 916 1936 zxcv.exe 28 PID 1936 wrote to memory of 916 1936 zxcv.exe 28 PID 1936 wrote to memory of 916 1936 zxcv.exe 28 PID 1936 wrote to memory of 916 1936 zxcv.exe 28 PID 1936 wrote to memory of 916 1936 zxcv.exe 28 PID 1936 wrote to memory of 916 1936 zxcv.exe 28 PID 1936 wrote to memory of 916 1936 zxcv.exe 28 PID 1936 wrote to memory of 916 1936 zxcv.exe 28 PID 1936 wrote to memory of 916 1936 zxcv.exe 28 PID 1936 wrote to memory of 916 1936 zxcv.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\zxcv.exe"C:\Users\Admin\AppData\Local\Temp\zxcv.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵PID:916
-