Analysis

  • max time kernel
    152s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    04-06-2022 15:39

General

  • Target

    0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe

  • Size

    345KB

  • MD5

    86c4c35439fd5cfe3aff15e8765e2050

  • SHA1

    e12e37c922d5b97c055f5d82f1a6fa7db9ad3e66

  • SHA256

    0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1

  • SHA512

    7858a9577ac4ce24d974914a2b25a7c2920c137bcc3dd2af91846bf618c85c6cff57d84a8e26a2840e48b23412ad5c41482a133c22d1958f7ccd674eadd5bd84

Score
10/10

Malware Config

Signatures

  • suricata: ET MALWARE Generic - POST To .php w/Extended ASCII Characters (Likely Zeus Derivative)

    suricata: ET MALWARE Generic - POST To .php w/Extended ASCII Characters (Likely Zeus Derivative)

  • suricata: ET MALWARE Zbot POST Request to C2

    suricata: ET MALWARE Zbot POST Request to C2

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops autorun.inf file 1 TTPs 8 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2700
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
      1⤵
        PID:2732
      • C:\Windows\system32\taskhostw.exe
        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
        1⤵
          PID:2824
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
          1⤵
            PID:3372
          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
            1⤵
              PID:3664
            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
              1⤵
                PID:3812
              • C:\Windows\System32\RuntimeBroker.exe
                C:\Windows\System32\RuntimeBroker.exe -Embedding
                1⤵
                  PID:4028
                • C:\Windows\System32\RuntimeBroker.exe
                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                  1⤵
                    PID:3728
                  • C:\Windows\system32\DllHost.exe
                    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                    1⤵
                      PID:3560
                    • C:\Windows\system32\backgroundTaskHost.exe
                      "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca
                      1⤵
                        PID:3060
                      • C:\Windows\Explorer.EXE
                        C:\Windows\Explorer.EXE
                        1⤵
                          PID:3272
                          • C:\Users\Admin\AppData\Local\Temp\0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe
                            "C:\Users\Admin\AppData\Local\Temp\0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe"
                            2⤵
                            • Drops autorun.inf file
                            • Suspicious use of SetThreadContext
                            • Suspicious use of WriteProcessMemory
                            PID:3804
                            • C:\Users\Admin\AppData\Local\Temp\0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe
                              "C:\Users\Admin\AppData\Local\Temp\0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1.exe"
                              3⤵
                              • Loads dropped DLL
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:4992
                              • C:\Users\Admin\AppData\Roaming\Viacokte\iculytfy.exe
                                "C:\Users\Admin\AppData\Roaming\Viacokte\iculytfy.exe"
                                4⤵
                                • Executes dropped EXE
                                • Drops autorun.inf file
                                • Suspicious use of SetThreadContext
                                • Suspicious use of WriteProcessMemory
                                PID:2116
                                • C:\Users\Admin\AppData\Roaming\Viacokte\iculytfy.exe
                                  "C:\Users\Admin\AppData\Roaming\Viacokte\iculytfy.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Adds Run key to start application
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  PID:988
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp62502133.bat"
                                4⤵
                                  PID:2364

                          Network

                          MITRE ATT&CK Enterprise v6

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Autorun.inf

                            Filesize

                            36B

                            MD5

                            8c3b6960085cd51d537e090d887c34b2

                            SHA1

                            a03f1685cb413f52c1cea6551cebf52a98b874c2

                            SHA256

                            a863f0112a6898ee05fa8af4a319a12694d2e182eebba3df891f6b911bb00587

                            SHA512

                            d2c79fac2cae7dda058da7eed5f1c35790074f024ea93f56c27e31d607549d0a1b1541b10380323c08d5ac9112ab6786f7b6f63ac9e0cfcdcbfdeab7eb90ec19

                          • C:\Diskrun2.exe

                            Filesize

                            345KB

                            MD5

                            86c4c35439fd5cfe3aff15e8765e2050

                            SHA1

                            e12e37c922d5b97c055f5d82f1a6fa7db9ad3e66

                            SHA256

                            0f6cd4e8159b243b7de4a18711fc39624491759beccb01386438f52175aad4b1

                            SHA512

                            7858a9577ac4ce24d974914a2b25a7c2920c137bcc3dd2af91846bf618c85c6cff57d84a8e26a2840e48b23412ad5c41482a133c22d1958f7ccd674eadd5bd84

                          • C:\Users\Admin\AppData\Local\Temp\tmp1B68.tmp

                            Filesize

                            625KB

                            MD5

                            eccf28d7e5ccec24119b88edd160f8f4

                            SHA1

                            98509587a3d37a20b56b50fd57f823a1691a034c

                            SHA256

                            820c83c0533cfce2928e29edeaf6c255bc19ac9718b25a5656d99ffac30a03d6

                            SHA512

                            c1c94bbb781625b2317f0a8178d3a10d891fb71bca8f82cd831c484e8ab125301b82a14fe2ff070dc99a496cc00234300fa5536401018c40d49d44ae89409670

                          • C:\Users\Admin\AppData\Local\Temp\tmp55F.tmp

                            Filesize

                            1.6MB

                            MD5

                            4f3387277ccbd6d1f21ac5c07fe4ca68

                            SHA1

                            e16506f662dc92023bf82def1d621497c8ab5890

                            SHA256

                            767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

                            SHA512

                            9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

                          • C:\Users\Admin\AppData\Local\Temp\tmp62502133.bat

                            Filesize

                            307B

                            MD5

                            5aec5e7be3b293859f3f30e4859e6734

                            SHA1

                            dae4c1d0004713d704909866efe46703415ad600

                            SHA256

                            d548001d0539170168ddc5250f0d755b87e9d68e1e6c84859e01b6d63ea2031a

                            SHA512

                            5de68177cde89880476128f71765e98537099071f61552414d9d721216796175c810316044f74076a19fa89c5dd0bbe0739318a88c150fab96f8289e3f4c134b

                          • C:\Users\Admin\AppData\Local\Temp\tmpEA84.tmp

                            Filesize

                            1.6MB

                            MD5

                            4f3387277ccbd6d1f21ac5c07fe4ca68

                            SHA1

                            e16506f662dc92023bf82def1d621497c8ab5890

                            SHA256

                            767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac

                            SHA512

                            9da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219

                          • C:\Users\Admin\AppData\Local\Temp\tmpEAB4.tmp

                            Filesize

                            625KB

                            MD5

                            eccf28d7e5ccec24119b88edd160f8f4

                            SHA1

                            98509587a3d37a20b56b50fd57f823a1691a034c

                            SHA256

                            820c83c0533cfce2928e29edeaf6c255bc19ac9718b25a5656d99ffac30a03d6

                            SHA512

                            c1c94bbb781625b2317f0a8178d3a10d891fb71bca8f82cd831c484e8ab125301b82a14fe2ff070dc99a496cc00234300fa5536401018c40d49d44ae89409670

                          • C:\Users\Admin\AppData\Roaming\Viacokte\iculytfy.exe

                            Filesize

                            345KB

                            MD5

                            17511599d14c22f58ff8fb65f0350fb8

                            SHA1

                            a3a084ca4e421435dc1f5398662137c6e3e6e414

                            SHA256

                            7b1f7a83e1d394bf999a021bf0812accd43ce5823bc0656fce51febff53831b2

                            SHA512

                            9840b3fff0015e2ab511697315785fc069d132a0be2078abd93d65c763748c00544955e383ec745bdc7766bc7b34ffc2751271f4c2d449d94b223df2f0db944b

                          • C:\Users\Admin\AppData\Roaming\Viacokte\iculytfy.exe

                            Filesize

                            345KB

                            MD5

                            17511599d14c22f58ff8fb65f0350fb8

                            SHA1

                            a3a084ca4e421435dc1f5398662137c6e3e6e414

                            SHA256

                            7b1f7a83e1d394bf999a021bf0812accd43ce5823bc0656fce51febff53831b2

                            SHA512

                            9840b3fff0015e2ab511697315785fc069d132a0be2078abd93d65c763748c00544955e383ec745bdc7766bc7b34ffc2751271f4c2d449d94b223df2f0db944b

                          • C:\Users\Admin\AppData\Roaming\Viacokte\iculytfy.exe

                            Filesize

                            345KB

                            MD5

                            17511599d14c22f58ff8fb65f0350fb8

                            SHA1

                            a3a084ca4e421435dc1f5398662137c6e3e6e414

                            SHA256

                            7b1f7a83e1d394bf999a021bf0812accd43ce5823bc0656fce51febff53831b2

                            SHA512

                            9840b3fff0015e2ab511697315785fc069d132a0be2078abd93d65c763748c00544955e383ec745bdc7766bc7b34ffc2751271f4c2d449d94b223df2f0db944b

                          • memory/988-161-0x0000000000400000-0x0000000000447000-memory.dmp

                            Filesize

                            284KB

                          • memory/988-144-0x0000000000000000-mapping.dmp

                          • memory/988-158-0x0000000000400000-0x0000000000447000-memory.dmp

                            Filesize

                            284KB

                          • memory/988-153-0x0000000000400000-0x0000000000447000-memory.dmp

                            Filesize

                            284KB

                          • memory/2116-141-0x0000000000000000-mapping.dmp

                          • memory/2364-150-0x0000000000000000-mapping.dmp

                          • memory/4992-135-0x0000000000400000-0x0000000000447000-memory.dmp

                            Filesize

                            284KB

                          • memory/4992-151-0x0000000000400000-0x0000000000447000-memory.dmp

                            Filesize

                            284KB

                          • memory/4992-134-0x0000000000400000-0x0000000000447000-memory.dmp

                            Filesize

                            284KB

                          • memory/4992-131-0x0000000000400000-0x0000000000447000-memory.dmp

                            Filesize

                            284KB

                          • memory/4992-137-0x0000000000400000-0x0000000000447000-memory.dmp

                            Filesize

                            284KB

                          • memory/4992-133-0x0000000000400000-0x0000000000447000-memory.dmp

                            Filesize

                            284KB

                          • memory/4992-130-0x0000000000000000-mapping.dmp

                          • memory/4992-139-0x0000000000400000-0x0000000000447000-memory.dmp

                            Filesize

                            284KB