Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    24-05-2022 03:23

General

  • Target

    00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe

  • Size

    361KB

  • MD5

    7bd0e512edd2194c38864df24bbaa71d

  • SHA1

    bc811c561cbde749b28f9f3b58f57b1ccc699f1a

  • SHA256

    00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8

  • SHA512

    6f0ea99edf859f8a9fb58fd7cd23efcb7aa284323acb40f426c9eaa780f258c157f61b275ce4d24d359aa42b4c6bfcdb05d04d63acacf0631f8eeee0c837fb81

Score
10/10

Malware Config

Signatures

  • suricata: ET MALWARE Generic - POST To .php w/Extended ASCII Characters (Likely Zeus Derivative)

    suricata: ET MALWARE Generic - POST To .php w/Extended ASCII Characters (Likely Zeus Derivative)

  • suricata: ET MALWARE Zbot POST Request to C2

    suricata: ET MALWARE Zbot POST Request to C2

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops autorun.inf file 1 TTPs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1108
    • C:\Users\Admin\AppData\Local\Temp\00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe
      "C:\Users\Admin\AppData\Local\Temp\00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe"
      1⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:376
      • C:\Users\Admin\AppData\Local\Temp\00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe
        "C:\Users\Admin\AppData\Local\Temp\00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:912
        • C:\Users\Admin\AppData\Roaming\Ytnuotegivna\badotyyry.exe
          "C:\Users\Admin\AppData\Roaming\Ytnuotegivna\badotyyry.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1128
          • C:\Users\Admin\AppData\Roaming\Ytnuotegivna\badotyyry.exe
            "C:\Users\Admin\AppData\Roaming\Ytnuotegivna\badotyyry.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1692
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpd7c1400b.bat"
          3⤵
          • Deletes itself
          PID:536
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1220
      • C:\Windows\system32\Dwm.exe
        "C:\Windows\system32\Dwm.exe"
        1⤵
          PID:1192
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1972
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
            1⤵
              PID:1604

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Autorun.inf

              Filesize

              35B

              MD5

              934aa9eb81516482c6367fb116ec9b1f

              SHA1

              1a97f913ef76ff83b1ba87c735b597b7b7564ae6

              SHA256

              ecb5eb3c67cb390de6fca259684385d1b839f2fa9b96c3198eb5837ebb65c609

              SHA512

              608d4a3dffb258db8418197dbc28c5bd814ca15517b4a96e6b51a3f36da586379c724ba32f4d413cd9d155bcd47780964567860df7352f2c437de297ab30d118

            • C:\Diskrun.exe

              Filesize

              361KB

              MD5

              7bd0e512edd2194c38864df24bbaa71d

              SHA1

              bc811c561cbde749b28f9f3b58f57b1ccc699f1a

              SHA256

              00f556f93fabf6766d5f859556a008eab39a176ba3c979cb143ad118506c33f8

              SHA512

              6f0ea99edf859f8a9fb58fd7cd23efcb7aa284323acb40f426c9eaa780f258c157f61b275ce4d24d359aa42b4c6bfcdb05d04d63acacf0631f8eeee0c837fb81

            • C:\Users\Admin\AppData\Local\Temp\tmpd7c1400b.bat

              Filesize

              307B

              MD5

              5a6dd9bbd3413c9b560eacc0ea5e50f2

              SHA1

              9f8f2f76e532382d01443abab3b5749ad5cc95f8

              SHA256

              07675f7d7e1fc2215893e7efa0fe326d9cf6b6718640bdaee728811e72d6eecc

              SHA512

              b3e0aeea8a637b6f9d982ceea8195c6ea74119eda5fdf5c4ab7671f34627264fd98cdf4f733414d9213749d2ab0deef6dffcc9bdcaf6cb5232da97b283b29042

            • C:\Users\Admin\AppData\Roaming\Ytnuotegivna\badotyyry.exe

              Filesize

              361KB

              MD5

              288e3438575e2a3e65dfafd8dfa50d92

              SHA1

              a64bb373a127b620c8fddf44af79b7711e467e59

              SHA256

              2009b8ec2e79c5250ab66e39d1d4c5195aac09909647868efc9d785cd795a2ff

              SHA512

              a80060b8561a2fe777c4f927898eececf33e802b17970171b736cfe50fee0a77e3bd14130c93f40873f189ce03966dabee4c484f0d26b267091c203adfd34431

            • C:\Users\Admin\AppData\Roaming\Ytnuotegivna\badotyyry.exe

              Filesize

              361KB

              MD5

              288e3438575e2a3e65dfafd8dfa50d92

              SHA1

              a64bb373a127b620c8fddf44af79b7711e467e59

              SHA256

              2009b8ec2e79c5250ab66e39d1d4c5195aac09909647868efc9d785cd795a2ff

              SHA512

              a80060b8561a2fe777c4f927898eececf33e802b17970171b736cfe50fee0a77e3bd14130c93f40873f189ce03966dabee4c484f0d26b267091c203adfd34431

            • C:\Users\Admin\AppData\Roaming\Ytnuotegivna\badotyyry.exe

              Filesize

              361KB

              MD5

              288e3438575e2a3e65dfafd8dfa50d92

              SHA1

              a64bb373a127b620c8fddf44af79b7711e467e59

              SHA256

              2009b8ec2e79c5250ab66e39d1d4c5195aac09909647868efc9d785cd795a2ff

              SHA512

              a80060b8561a2fe777c4f927898eececf33e802b17970171b736cfe50fee0a77e3bd14130c93f40873f189ce03966dabee4c484f0d26b267091c203adfd34431

            • \Users\Admin\AppData\Local\Temp\tmp404C.tmp

              Filesize

              964KB

              MD5

              469725980923df7f823172bb493ea5a4

              SHA1

              2a9f963411cb8bc69e29587afc2d1879949caf7d

              SHA256

              54dfc1cd5c13aeae9dc40593fd0d2643975f7d9a4506e4b4536dcfac12249756

              SHA512

              b443a4026d183bee1fa8b240e8e6125366ee9d0a5eca160ec15e4d15f635c280dced81f5af5912abcaa16d3d17e34c1629f769721983fcffb099026dfa2c98c6

            • \Users\Admin\AppData\Local\Temp\tmp406C.tmp

              Filesize

              1.1MB

              MD5

              9b98d47916ead4f69ef51b56b0c2323c

              SHA1

              290a80b4ded0efc0fd00816f373fcea81a521330

              SHA256

              96e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b

              SHA512

              68b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94

            • \Users\Admin\AppData\Local\Temp\tmp8DCF.tmp

              Filesize

              1.2MB

              MD5

              d124f55b9393c976963407dff51ffa79

              SHA1

              2c7bbedd79791bfb866898c85b504186db610b5d

              SHA256

              ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

              SHA512

              278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

            • \Users\Admin\AppData\Local\Temp\tmp8DEF.tmp

              Filesize

              1.1MB

              MD5

              9b98d47916ead4f69ef51b56b0c2323c

              SHA1

              290a80b4ded0efc0fd00816f373fcea81a521330

              SHA256

              96e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b

              SHA512

              68b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94

            • \Users\Admin\AppData\Roaming\Ytnuotegivna\badotyyry.exe

              Filesize

              361KB

              MD5

              288e3438575e2a3e65dfafd8dfa50d92

              SHA1

              a64bb373a127b620c8fddf44af79b7711e467e59

              SHA256

              2009b8ec2e79c5250ab66e39d1d4c5195aac09909647868efc9d785cd795a2ff

              SHA512

              a80060b8561a2fe777c4f927898eececf33e802b17970171b736cfe50fee0a77e3bd14130c93f40873f189ce03966dabee4c484f0d26b267091c203adfd34431

            • \Users\Admin\AppData\Roaming\Ytnuotegivna\badotyyry.exe

              Filesize

              361KB

              MD5

              288e3438575e2a3e65dfafd8dfa50d92

              SHA1

              a64bb373a127b620c8fddf44af79b7711e467e59

              SHA256

              2009b8ec2e79c5250ab66e39d1d4c5195aac09909647868efc9d785cd795a2ff

              SHA512

              a80060b8561a2fe777c4f927898eececf33e802b17970171b736cfe50fee0a77e3bd14130c93f40873f189ce03966dabee4c484f0d26b267091c203adfd34431

            • memory/376-54-0x00000000764C1000-0x00000000764C3000-memory.dmp

              Filesize

              8KB

            • memory/536-92-0x0000000000000000-mapping.dmp

            • memory/912-65-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/912-66-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/912-59-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/912-55-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/912-72-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/912-56-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/912-58-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/912-61-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/912-69-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/912-67-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/912-62-0x000000000043F4D4-mapping.dmp

            • memory/1108-103-0x0000000001D40000-0x0000000001D87000-memory.dmp

              Filesize

              284KB

            • memory/1108-104-0x0000000001D40000-0x0000000001D87000-memory.dmp

              Filesize

              284KB

            • memory/1108-105-0x0000000001D40000-0x0000000001D87000-memory.dmp

              Filesize

              284KB

            • memory/1108-102-0x0000000001D40000-0x0000000001D87000-memory.dmp

              Filesize

              284KB

            • memory/1128-75-0x0000000000000000-mapping.dmp

            • memory/1192-108-0x0000000001AC0000-0x0000000001B07000-memory.dmp

              Filesize

              284KB

            • memory/1192-110-0x0000000001AC0000-0x0000000001B07000-memory.dmp

              Filesize

              284KB

            • memory/1192-111-0x0000000001AC0000-0x0000000001B07000-memory.dmp

              Filesize

              284KB

            • memory/1192-109-0x0000000001AC0000-0x0000000001B07000-memory.dmp

              Filesize

              284KB

            • memory/1220-115-0x00000000026D0000-0x0000000002717000-memory.dmp

              Filesize

              284KB

            • memory/1220-114-0x00000000026D0000-0x0000000002717000-memory.dmp

              Filesize

              284KB

            • memory/1220-117-0x00000000026D0000-0x0000000002717000-memory.dmp

              Filesize

              284KB

            • memory/1220-116-0x00000000026D0000-0x0000000002717000-memory.dmp

              Filesize

              284KB

            • memory/1604-130-0x0000000000310000-0x0000000000357000-memory.dmp

              Filesize

              284KB

            • memory/1604-129-0x0000000000310000-0x0000000000357000-memory.dmp

              Filesize

              284KB

            • memory/1604-128-0x0000000000310000-0x0000000000357000-memory.dmp

              Filesize

              284KB

            • memory/1604-127-0x0000000000310000-0x0000000000357000-memory.dmp

              Filesize

              284KB

            • memory/1692-118-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/1692-86-0x000000000043F4D4-mapping.dmp

            • memory/1972-124-0x0000000003A50000-0x0000000003A97000-memory.dmp

              Filesize

              284KB

            • memory/1972-123-0x0000000003A50000-0x0000000003A97000-memory.dmp

              Filesize

              284KB

            • memory/1972-122-0x0000000003A50000-0x0000000003A97000-memory.dmp

              Filesize

              284KB

            • memory/1972-121-0x0000000003A50000-0x0000000003A97000-memory.dmp

              Filesize

              284KB