Analysis

  • max time kernel
    150s
  • max time network
    177s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    04/06/2022, 15:39

General

  • Target

    0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe

  • Size

    345KB

  • MD5

    86c4c35439fd5cfe3aff15e8765e2050

  • SHA1

    e12e37c922d5b97c055f5d82f1a6fa7db9ad3e66

  • SHA256

    0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1

  • SHA512

    7858a9577ac4ce24d974914a2b25a7c2920c137bcc3dd2af91846bf618c85c6cff57d84a8e26a2840e48b23412ad5c41482a133c22d1958f7ccd674eadd5bd84

Score
10/10

Malware Config

Signatures

  • suricata: ET MALWARE Generic - POST To .php w/Extended ASCII Characters (Likely Zeus Derivative)

    suricata: ET MALWARE Generic - POST To .php w/Extended ASCII Characters (Likely Zeus Derivative)

  • suricata: ET MALWARE Zbot POST Request to C2

    suricata: ET MALWARE Zbot POST Request to C2

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops autorun.inf file 1 TTPs 8 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe
    "C:\Users\Admin\AppData\Local\Temp\0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe"
    1⤵
    • Drops autorun.inf file
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Users\Admin\AppData\Local\Temp\0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe
      "C:\Users\Admin\AppData\Local\Temp\0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:992
      • C:\Users\Admin\AppData\Roaming\Nypuhuquim\alusgenev.exe
        "C:\Users\Admin\AppData\Roaming\Nypuhuquim\alusgenev.exe"
        3⤵
        • Executes dropped EXE
        • Drops autorun.inf file
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1804
        • C:\Users\Admin\AppData\Roaming\Nypuhuquim\alusgenev.exe
          "C:\Users\Admin\AppData\Roaming\Nypuhuquim\alusgenev.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1496
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpa45d6aad.bat"
        3⤵
        • Deletes itself
        PID:1100
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1188
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1152
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1112
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1952
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
            1⤵
              PID:1992

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Autorun.inf

              Filesize

              36B

              MD5

              8c3b6960085cd51d537e090d887c34b2

              SHA1

              a03f1685cb413f52c1cea6551cebf52a98b874c2

              SHA256

              a863f0112a6898ee05fa8af4a319a12694d2e182eebba3df891f6b911bb00587

              SHA512

              d2c79fac2cae7dda058da7eed5f1c35790074f024ea93f56c27e31d607549d0a1b1541b10380323c08d5ac9112ab6786f7b6f63ac9e0cfcdcbfdeab7eb90ec19

            • C:\Diskrun2.exe

              Filesize

              345KB

              MD5

              86c4c35439fd5cfe3aff15e8765e2050

              SHA1

              e12e37c922d5b97c055f5d82f1a6fa7db9ad3e66

              SHA256

              0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1

              SHA512

              7858a9577ac4ce24d974914a2b25a7c2920c137bcc3dd2af91846bf618c85c6cff57d84a8e26a2840e48b23412ad5c41482a133c22d1958f7ccd674eadd5bd84

            • C:\Users\Admin\AppData\Local\Temp\tmpa45d6aad.bat

              Filesize

              307B

              MD5

              c06164e49b67ce0c519cad86f7a15559

              SHA1

              24d1fd842818dfb78836a92e59e1ca164629d7c6

              SHA256

              b6326281112f3fc62c41ac09fed2d4057e3abc36c7aae8e5af770a7a7a40e4f6

              SHA512

              760ceaef49e001423a1495a9e6d0334a1591d3f5108da29bc5e34b42d58abfbda121537de0d55e731e69e5b699e57db1f06e2dd3e4b1959001859535ae3f1b78

            • C:\Users\Admin\AppData\Roaming\Nypuhuquim\alusgenev.exe

              Filesize

              345KB

              MD5

              8319f66a27897e73aae2eaa518fc52fd

              SHA1

              6cd6ecb406761ce7c7eb38fc767f104d22d9c9c8

              SHA256

              5c306eaced86265e20740da802d1ab8b1945bc397018af1265fec145fecbde56

              SHA512

              96a20ab27cd8326c4f692e9a9e5690a1855e08b2d14e1904ca8b55534b65ff43fcf6b2e14c6979cdeec9bb6f574e3b1acd537d755f129bbb4107284bc13b1fe0

            • C:\Users\Admin\AppData\Roaming\Nypuhuquim\alusgenev.exe

              Filesize

              345KB

              MD5

              8319f66a27897e73aae2eaa518fc52fd

              SHA1

              6cd6ecb406761ce7c7eb38fc767f104d22d9c9c8

              SHA256

              5c306eaced86265e20740da802d1ab8b1945bc397018af1265fec145fecbde56

              SHA512

              96a20ab27cd8326c4f692e9a9e5690a1855e08b2d14e1904ca8b55534b65ff43fcf6b2e14c6979cdeec9bb6f574e3b1acd537d755f129bbb4107284bc13b1fe0

            • C:\Users\Admin\AppData\Roaming\Nypuhuquim\alusgenev.exe

              Filesize

              345KB

              MD5

              8319f66a27897e73aae2eaa518fc52fd

              SHA1

              6cd6ecb406761ce7c7eb38fc767f104d22d9c9c8

              SHA256

              5c306eaced86265e20740da802d1ab8b1945bc397018af1265fec145fecbde56

              SHA512

              96a20ab27cd8326c4f692e9a9e5690a1855e08b2d14e1904ca8b55534b65ff43fcf6b2e14c6979cdeec9bb6f574e3b1acd537d755f129bbb4107284bc13b1fe0

            • \Users\Admin\AppData\Local\Temp\tmp7263.tmp

              Filesize

              1.2MB

              MD5

              d124f55b9393c976963407dff51ffa79

              SHA1

              2c7bbedd79791bfb866898c85b504186db610b5d

              SHA256

              ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

              SHA512

              278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

            • \Users\Admin\AppData\Local\Temp\tmp85D5.tmp

              Filesize

              1.1MB

              MD5

              9b98d47916ead4f69ef51b56b0c2323c

              SHA1

              290a80b4ded0efc0fd00816f373fcea81a521330

              SHA256

              96e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b

              SHA512

              68b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94

            • \Users\Admin\AppData\Local\Temp\tmpC9A6.tmp

              Filesize

              1.2MB

              MD5

              d124f55b9393c976963407dff51ffa79

              SHA1

              2c7bbedd79791bfb866898c85b504186db610b5d

              SHA256

              ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

              SHA512

              278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

            • \Users\Admin\AppData\Local\Temp\tmpC9E6.tmp

              Filesize

              1.1MB

              MD5

              9b98d47916ead4f69ef51b56b0c2323c

              SHA1

              290a80b4ded0efc0fd00816f373fcea81a521330

              SHA256

              96e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b

              SHA512

              68b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94

            • \Users\Admin\AppData\Roaming\Nypuhuquim\alusgenev.exe

              Filesize

              345KB

              MD5

              8319f66a27897e73aae2eaa518fc52fd

              SHA1

              6cd6ecb406761ce7c7eb38fc767f104d22d9c9c8

              SHA256

              5c306eaced86265e20740da802d1ab8b1945bc397018af1265fec145fecbde56

              SHA512

              96a20ab27cd8326c4f692e9a9e5690a1855e08b2d14e1904ca8b55534b65ff43fcf6b2e14c6979cdeec9bb6f574e3b1acd537d755f129bbb4107284bc13b1fe0

            • \Users\Admin\AppData\Roaming\Nypuhuquim\alusgenev.exe

              Filesize

              345KB

              MD5

              8319f66a27897e73aae2eaa518fc52fd

              SHA1

              6cd6ecb406761ce7c7eb38fc767f104d22d9c9c8

              SHA256

              5c306eaced86265e20740da802d1ab8b1945bc397018af1265fec145fecbde56

              SHA512

              96a20ab27cd8326c4f692e9a9e5690a1855e08b2d14e1904ca8b55534b65ff43fcf6b2e14c6979cdeec9bb6f574e3b1acd537d755f129bbb4107284bc13b1fe0

            • memory/992-95-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/992-65-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/992-70-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/992-68-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/992-71-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/992-67-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/992-66-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/992-58-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/992-80-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/992-61-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/992-59-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/992-55-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/992-56-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/1112-108-0x0000000001E30000-0x0000000001E77000-memory.dmp

              Filesize

              284KB

            • memory/1112-110-0x0000000001E30000-0x0000000001E77000-memory.dmp

              Filesize

              284KB

            • memory/1112-107-0x0000000001E30000-0x0000000001E77000-memory.dmp

              Filesize

              284KB

            • memory/1112-109-0x0000000001E30000-0x0000000001E77000-memory.dmp

              Filesize

              284KB

            • memory/1152-116-0x0000000000120000-0x0000000000167000-memory.dmp

              Filesize

              284KB

            • memory/1152-115-0x0000000000120000-0x0000000000167000-memory.dmp

              Filesize

              284KB

            • memory/1152-114-0x0000000000120000-0x0000000000167000-memory.dmp

              Filesize

              284KB

            • memory/1152-113-0x0000000000120000-0x0000000000167000-memory.dmp

              Filesize

              284KB

            • memory/1188-119-0x0000000002B30000-0x0000000002B77000-memory.dmp

              Filesize

              284KB

            • memory/1188-120-0x0000000002B30000-0x0000000002B77000-memory.dmp

              Filesize

              284KB

            • memory/1188-121-0x0000000002B30000-0x0000000002B77000-memory.dmp

              Filesize

              284KB

            • memory/1188-122-0x0000000002B30000-0x0000000002B77000-memory.dmp

              Filesize

              284KB

            • memory/1496-135-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/1496-102-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/1496-97-0x0000000000400000-0x0000000000447000-memory.dmp

              Filesize

              284KB

            • memory/1628-54-0x0000000075EF1000-0x0000000075EF3000-memory.dmp

              Filesize

              8KB

            • memory/1952-125-0x0000000003B80000-0x0000000003BC7000-memory.dmp

              Filesize

              284KB

            • memory/1952-127-0x0000000003B80000-0x0000000003BC7000-memory.dmp

              Filesize

              284KB

            • memory/1952-128-0x0000000003B80000-0x0000000003BC7000-memory.dmp

              Filesize

              284KB

            • memory/1952-126-0x0000000003B80000-0x0000000003BC7000-memory.dmp

              Filesize

              284KB

            • memory/1992-133-0x0000000000120000-0x0000000000167000-memory.dmp

              Filesize

              284KB

            • memory/1992-134-0x0000000000120000-0x0000000000167000-memory.dmp

              Filesize

              284KB

            • memory/1992-132-0x0000000000120000-0x0000000000167000-memory.dmp

              Filesize

              284KB

            • memory/1992-131-0x0000000000120000-0x0000000000167000-memory.dmp

              Filesize

              284KB