Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 15:18

General

  • Target

    19fd777b0fb369771ab80cfc19b14c3ae0f33bfd643c7d1d95badac74128af21.exe

  • Size

    40KB

  • MD5

    81f47b7cb47403d208b44f513b292430

  • SHA1

    5c6bd4bc656ce60a833f8068e7b324afb85e0269

  • SHA256

    19fd777b0fb369771ab80cfc19b14c3ae0f33bfd643c7d1d95badac74128af21

  • SHA512

    b903d03494d9810b4b665d9dece0e8b4879c86a7ec976812edb509b149fdbfaed203c4ba5ac573ca753946d4bad70ef05049f7319e7bbb088eba20f0a19c26fc

  • SSDEEP

    768:aq9m/ZsybSg2ts4L3RLc/qjhsKmHbk1+qJ0UtHtgYR:aqk/Zdic/qjh8w19JDHv

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19fd777b0fb369771ab80cfc19b14c3ae0f33bfd643c7d1d95badac74128af21.exe
    "C:\Users\Admin\AppData\Local\Temp\19fd777b0fb369771ab80cfc19b14c3ae0f33bfd643c7d1d95badac74128af21.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:4912

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    1KB

    MD5

    b4b836cfd650837479e2e394c1b497a3

    SHA1

    0b2764d19ebe3348bb0fcbce5ed8ef35e4897c9a

    SHA256

    8459b32cda1310d8440cee6c0c8a59e6c6c7591316951c4b44ed079fc91e8c10

    SHA512

    57bd606fc97ae7247700764a41b4c64c0e491ed659b4b1c625a6b0d9d76db8355b632fdf2bafc4ad17e07f568cb719a8f906fa2f9e5c0e40da525ec332ce43c1

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    1KB

    MD5

    d875754ade8421d149845ca7201e57bc

    SHA1

    79325109a8b57dd253fbb4f068ee6f846cf66f70

    SHA256

    b45137fa1d5b86ae8e22b99c37922ac0b5e64e5e1722dc1e0affaf248adeab7a

    SHA512

    d4f57fade32607d36f4d24aca575165746b2e7a19c234160b8ef9927ba5eb8d269593596c1c68590d6241f4ec2a57aa5c392222942bddcb7d19756836a0a8700

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    1KB

    MD5

    8e5386ad7f1248644146f25a37a1cf58

    SHA1

    62c7dba1905f79b3865ea63ccba263043b549bb1

    SHA256

    38c2612a7e6bd8ece172fbdc50a0e71f677dad1003b09eb6348d2a3f9febb769

    SHA512

    b05131af5277c763ff9eed9febb3f003e4e027be9256bea280e2e96d77ab6975e7540895d1bc829de5a9ff76f2d4c707c63bec7b1d36517a6c874ef9967a9e7f

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/2268-132-0x0000000000500000-0x000000000050D000-memory.dmp

    Filesize

    52KB

  • memory/4912-137-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4912-138-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB