Analysis
-
max time kernel
150s -
max time network
177s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
04/06/2022, 15:39
Static task
static1
Behavioral task
behavioral1
Sample
0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe
Resource
win10v2004-20220414-en
General
-
Target
0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe
-
Size
345KB
-
MD5
86c4c35439fd5cfe3aff15e8765e2050
-
SHA1
e12e37c922d5b97c055f5d82f1a6fa7db9ad3e66
-
SHA256
0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1
-
SHA512
7858a9577ac4ce24d974914a2b25a7c2920c137bcc3dd2af91846bf618c85c6cff57d84a8e26a2840e48b23412ad5c41482a133c22d1958f7ccd674eadd5bd84
Malware Config
Signatures
-
suricata: ET MALWARE Generic - POST To .php w/Extended ASCII Characters (Likely Zeus Derivative)
suricata: ET MALWARE Generic - POST To .php w/Extended ASCII Characters (Likely Zeus Derivative)
-
suricata: ET MALWARE Zbot POST Request to C2
suricata: ET MALWARE Zbot POST Request to C2
-
Executes dropped EXE 2 IoCs
pid Process 1804 alusgenev.exe 1496 alusgenev.exe -
Deletes itself 1 IoCs
pid Process 1100 cmd.exe -
Loads dropped DLL 6 IoCs
pid Process 992 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe 992 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe 992 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe 992 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe 1496 alusgenev.exe 1496 alusgenev.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\SOFTWARE\Microsoft\Windows\Currentversion\Run alusgenev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\Currentversion\Run alusgenev.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\Luunalves = "C:\\Users\\Admin\\AppData\\Roaming\\Nypuhuquim\\alusgenev.exe" alusgenev.exe -
Drops autorun.inf file 1 TTPs 8 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Autorun.inf 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe File created D:\Autorun.inf 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe File opened for modification D:\Autorun.inf 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe File created C:\Autorun.inf alusgenev.exe File opened for modification C:\Autorun.inf alusgenev.exe File created D:\Autorun.inf alusgenev.exe File opened for modification D:\Autorun.inf alusgenev.exe File created C:\Autorun.inf 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1628 set thread context of 992 1628 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe 28 PID 1804 set thread context of 1496 1804 alusgenev.exe 30 -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 992 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe 1496 alusgenev.exe 1496 alusgenev.exe 1496 alusgenev.exe 1496 alusgenev.exe 1496 alusgenev.exe 1496 alusgenev.exe 1496 alusgenev.exe 1496 alusgenev.exe 1496 alusgenev.exe 1496 alusgenev.exe 1496 alusgenev.exe 1496 alusgenev.exe 1496 alusgenev.exe 1496 alusgenev.exe 1496 alusgenev.exe 1496 alusgenev.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 992 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe Token: SeSecurityPrivilege 992 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe Token: SeSecurityPrivilege 992 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe Token: SeSecurityPrivilege 992 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe Token: SeSecurityPrivilege 1496 alusgenev.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 1628 wrote to memory of 992 1628 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe 28 PID 1628 wrote to memory of 992 1628 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe 28 PID 1628 wrote to memory of 992 1628 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe 28 PID 1628 wrote to memory of 992 1628 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe 28 PID 1628 wrote to memory of 992 1628 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe 28 PID 1628 wrote to memory of 992 1628 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe 28 PID 1628 wrote to memory of 992 1628 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe 28 PID 1628 wrote to memory of 992 1628 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe 28 PID 1628 wrote to memory of 992 1628 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe 28 PID 992 wrote to memory of 1804 992 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe 29 PID 992 wrote to memory of 1804 992 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe 29 PID 992 wrote to memory of 1804 992 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe 29 PID 992 wrote to memory of 1804 992 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe 29 PID 1804 wrote to memory of 1496 1804 alusgenev.exe 30 PID 1804 wrote to memory of 1496 1804 alusgenev.exe 30 PID 1804 wrote to memory of 1496 1804 alusgenev.exe 30 PID 1804 wrote to memory of 1496 1804 alusgenev.exe 30 PID 1804 wrote to memory of 1496 1804 alusgenev.exe 30 PID 1804 wrote to memory of 1496 1804 alusgenev.exe 30 PID 1804 wrote to memory of 1496 1804 alusgenev.exe 30 PID 1804 wrote to memory of 1496 1804 alusgenev.exe 30 PID 1804 wrote to memory of 1496 1804 alusgenev.exe 30 PID 992 wrote to memory of 1100 992 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe 31 PID 992 wrote to memory of 1100 992 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe 31 PID 992 wrote to memory of 1100 992 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe 31 PID 992 wrote to memory of 1100 992 0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe 31 PID 1496 wrote to memory of 1112 1496 alusgenev.exe 18 PID 1496 wrote to memory of 1112 1496 alusgenev.exe 18 PID 1496 wrote to memory of 1112 1496 alusgenev.exe 18 PID 1496 wrote to memory of 1112 1496 alusgenev.exe 18 PID 1496 wrote to memory of 1112 1496 alusgenev.exe 18 PID 1496 wrote to memory of 1152 1496 alusgenev.exe 17 PID 1496 wrote to memory of 1152 1496 alusgenev.exe 17 PID 1496 wrote to memory of 1152 1496 alusgenev.exe 17 PID 1496 wrote to memory of 1152 1496 alusgenev.exe 17 PID 1496 wrote to memory of 1152 1496 alusgenev.exe 17 PID 1496 wrote to memory of 1188 1496 alusgenev.exe 16 PID 1496 wrote to memory of 1188 1496 alusgenev.exe 16 PID 1496 wrote to memory of 1188 1496 alusgenev.exe 16 PID 1496 wrote to memory of 1188 1496 alusgenev.exe 16 PID 1496 wrote to memory of 1188 1496 alusgenev.exe 16 PID 1496 wrote to memory of 1952 1496 alusgenev.exe 34 PID 1496 wrote to memory of 1952 1496 alusgenev.exe 34 PID 1496 wrote to memory of 1952 1496 alusgenev.exe 34 PID 1496 wrote to memory of 1952 1496 alusgenev.exe 34 PID 1496 wrote to memory of 1952 1496 alusgenev.exe 34 PID 1496 wrote to memory of 1992 1496 alusgenev.exe 35 PID 1496 wrote to memory of 1992 1496 alusgenev.exe 35 PID 1496 wrote to memory of 1992 1496 alusgenev.exe 35 PID 1496 wrote to memory of 1992 1496 alusgenev.exe 35 PID 1496 wrote to memory of 1992 1496 alusgenev.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe"C:\Users\Admin\AppData\Local\Temp\0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe"1⤵
- Drops autorun.inf file
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe"C:\Users\Admin\AppData\Local\Temp\0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Users\Admin\AppData\Roaming\Nypuhuquim\alusgenev.exe"C:\Users\Admin\AppData\Roaming\Nypuhuquim\alusgenev.exe"3⤵
- Executes dropped EXE
- Drops autorun.inf file
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Roaming\Nypuhuquim\alusgenev.exe"C:\Users\Admin\AppData\Roaming\Nypuhuquim\alusgenev.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1496
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpa45d6aad.bat"3⤵
- Deletes itself
PID:1100
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1152
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1952
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1992
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36B
MD58c3b6960085cd51d537e090d887c34b2
SHA1a03f1685cb413f52c1cea6551cebf52a98b874c2
SHA256a863f0112a6898ee05fa8af4a319a12694d2e182eebba3df891f6b911bb00587
SHA512d2c79fac2cae7dda058da7eed5f1c35790074f024ea93f56c27e31d607549d0a1b1541b10380323c08d5ac9112ab6786f7b6f63ac9e0cfcdcbfdeab7eb90ec19
-
Filesize
345KB
MD586c4c35439fd5cfe3aff15e8765e2050
SHA1e12e37c922d5b97c055f5d82f1a6fa7db9ad3e66
SHA2560f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1
SHA5127858a9577ac4ce24d974914a2b25a7c2920c137bcc3dd2af91846bf618c85c6cff57d84a8e26a2840e48b23412ad5c41482a133c22d1958f7ccd674eadd5bd84
-
Filesize
307B
MD5c06164e49b67ce0c519cad86f7a15559
SHA124d1fd842818dfb78836a92e59e1ca164629d7c6
SHA256b6326281112f3fc62c41ac09fed2d4057e3abc36c7aae8e5af770a7a7a40e4f6
SHA512760ceaef49e001423a1495a9e6d0334a1591d3f5108da29bc5e34b42d58abfbda121537de0d55e731e69e5b699e57db1f06e2dd3e4b1959001859535ae3f1b78
-
Filesize
345KB
MD58319f66a27897e73aae2eaa518fc52fd
SHA16cd6ecb406761ce7c7eb38fc767f104d22d9c9c8
SHA2565c306eaced86265e20740da802d1ab8b1945bc397018af1265fec145fecbde56
SHA51296a20ab27cd8326c4f692e9a9e5690a1855e08b2d14e1904ca8b55534b65ff43fcf6b2e14c6979cdeec9bb6f574e3b1acd537d755f129bbb4107284bc13b1fe0
-
Filesize
345KB
MD58319f66a27897e73aae2eaa518fc52fd
SHA16cd6ecb406761ce7c7eb38fc767f104d22d9c9c8
SHA2565c306eaced86265e20740da802d1ab8b1945bc397018af1265fec145fecbde56
SHA51296a20ab27cd8326c4f692e9a9e5690a1855e08b2d14e1904ca8b55534b65ff43fcf6b2e14c6979cdeec9bb6f574e3b1acd537d755f129bbb4107284bc13b1fe0
-
Filesize
345KB
MD58319f66a27897e73aae2eaa518fc52fd
SHA16cd6ecb406761ce7c7eb38fc767f104d22d9c9c8
SHA2565c306eaced86265e20740da802d1ab8b1945bc397018af1265fec145fecbde56
SHA51296a20ab27cd8326c4f692e9a9e5690a1855e08b2d14e1904ca8b55534b65ff43fcf6b2e14c6979cdeec9bb6f574e3b1acd537d755f129bbb4107284bc13b1fe0
-
Filesize
1.2MB
MD5d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
Filesize
1.1MB
MD59b98d47916ead4f69ef51b56b0c2323c
SHA1290a80b4ded0efc0fd00816f373fcea81a521330
SHA25696e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b
SHA51268b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94
-
Filesize
1.2MB
MD5d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
Filesize
1.1MB
MD59b98d47916ead4f69ef51b56b0c2323c
SHA1290a80b4ded0efc0fd00816f373fcea81a521330
SHA25696e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b
SHA51268b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94
-
Filesize
345KB
MD58319f66a27897e73aae2eaa518fc52fd
SHA16cd6ecb406761ce7c7eb38fc767f104d22d9c9c8
SHA2565c306eaced86265e20740da802d1ab8b1945bc397018af1265fec145fecbde56
SHA51296a20ab27cd8326c4f692e9a9e5690a1855e08b2d14e1904ca8b55534b65ff43fcf6b2e14c6979cdeec9bb6f574e3b1acd537d755f129bbb4107284bc13b1fe0
-
Filesize
345KB
MD58319f66a27897e73aae2eaa518fc52fd
SHA16cd6ecb406761ce7c7eb38fc767f104d22d9c9c8
SHA2565c306eaced86265e20740da802d1ab8b1945bc397018af1265fec145fecbde56
SHA51296a20ab27cd8326c4f692e9a9e5690a1855e08b2d14e1904ca8b55534b65ff43fcf6b2e14c6979cdeec9bb6f574e3b1acd537d755f129bbb4107284bc13b1fe0