Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 00:18

General

  • Target

    69c217db8d70a9909e220a6f367622aaccfbc320db811f604bfeee0f3ec1ea29.exe

  • Size

    28KB

  • MD5

    a0fd4087fa07962a30b1ad30564514a0

  • SHA1

    397a2c32aa756f654c0925574126075634de58b7

  • SHA256

    69c217db8d70a9909e220a6f367622aaccfbc320db811f604bfeee0f3ec1ea29

  • SHA512

    787fe4daca2f34400a436bde24f46001ea1d2d1b21629eb9496490ba321faaf6d2b4dda70a0a92d55ac2d4a53c4ca14826bf8bd0cc950713c2c5a3906e5fa6bb

  • SSDEEP

    384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyN1nBpfyyd:Dv8IRRdsxq1DjJcqf2B1d

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\69c217db8d70a9909e220a6f367622aaccfbc320db811f604bfeee0f3ec1ea29.exe
    "C:\Users\Admin\AppData\Local\Temp\69c217db8d70a9909e220a6f367622aaccfbc320db811f604bfeee0f3ec1ea29.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1604
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1156

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    1KB

    MD5

    8168ade328bdf7a30314e9167be22c3d

    SHA1

    3691376bd753ce6cae900a6c2ec795904c1a552e

    SHA256

    02df944a214a7668d783be0e7edeeb7025e3369c311b4712733d31fe8c611a2e

    SHA512

    d1d89e0ef12c2f75a28e12989c265924af6d83639c6798486fbb087265492f5d3a5203b9e764cce881ed59a0c6194c5379c4269db6e299c25b4a4efa6fbef343

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/1156-57-0x0000000076461000-0x0000000076463000-memory.dmp

    Filesize

    8KB

  • memory/1156-61-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1156-62-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1604-58-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1604-59-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1604-60-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB