Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:59
Static task
static1
Behavioral task
behavioral1
Sample
dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exe
Resource
win10v2004-20220901-en
General
-
Target
dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exe
-
Size
341KB
-
MD5
13d33a9ff6c77a3b7d08a4557d0a5e67
-
SHA1
78adf14b76c5f6ed6f94172ae1ea9ff756d65776
-
SHA256
dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7
-
SHA512
00dcb19ac270b06914c35e38f467bd49d4f3829f74f4d98e1c2af7e6c73e43eff7613127b483653b6d35d2d4aa3ed64a8c0e562a1542786db6493df0faf016b8
-
SSDEEP
6144:bLwrTiWBUMLRr4ruCg4b4m+HSyD3YxHQnkcJFo9FR0YxlHA/7:bLwrTiqBLR0uFkrW3sHdcJFGFRPHs7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
zuato.exepid process 1272 zuato.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 616 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exepid process 836 dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
zuato.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run zuato.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Zuato = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Quosy\\zuato.exe" zuato.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exedescription pid process target process PID 836 set thread context of 616 836 dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
Processes:
dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exezuato.exepid process 836 dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exe 1272 zuato.exe 1272 zuato.exe 1272 zuato.exe 1272 zuato.exe 1272 zuato.exe 1272 zuato.exe 1272 zuato.exe 1272 zuato.exe 1272 zuato.exe 1272 zuato.exe 1272 zuato.exe 1272 zuato.exe 1272 zuato.exe 1272 zuato.exe 1272 zuato.exe 1272 zuato.exe 1272 zuato.exe 1272 zuato.exe 1272 zuato.exe 1272 zuato.exe 1272 zuato.exe 1272 zuato.exe 1272 zuato.exe 1272 zuato.exe 1272 zuato.exe 1272 zuato.exe 1272 zuato.exe 1272 zuato.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exezuato.exedescription pid process target process PID 836 wrote to memory of 1272 836 dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exe zuato.exe PID 836 wrote to memory of 1272 836 dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exe zuato.exe PID 836 wrote to memory of 1272 836 dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exe zuato.exe PID 836 wrote to memory of 1272 836 dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exe zuato.exe PID 1272 wrote to memory of 1228 1272 zuato.exe taskhost.exe PID 1272 wrote to memory of 1228 1272 zuato.exe taskhost.exe PID 1272 wrote to memory of 1228 1272 zuato.exe taskhost.exe PID 1272 wrote to memory of 1228 1272 zuato.exe taskhost.exe PID 1272 wrote to memory of 1228 1272 zuato.exe taskhost.exe PID 1272 wrote to memory of 1316 1272 zuato.exe Dwm.exe PID 1272 wrote to memory of 1316 1272 zuato.exe Dwm.exe PID 1272 wrote to memory of 1316 1272 zuato.exe Dwm.exe PID 1272 wrote to memory of 1316 1272 zuato.exe Dwm.exe PID 1272 wrote to memory of 1316 1272 zuato.exe Dwm.exe PID 1272 wrote to memory of 1352 1272 zuato.exe Explorer.EXE PID 1272 wrote to memory of 1352 1272 zuato.exe Explorer.EXE PID 1272 wrote to memory of 1352 1272 zuato.exe Explorer.EXE PID 1272 wrote to memory of 1352 1272 zuato.exe Explorer.EXE PID 1272 wrote to memory of 1352 1272 zuato.exe Explorer.EXE PID 1272 wrote to memory of 836 1272 zuato.exe dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exe PID 1272 wrote to memory of 836 1272 zuato.exe dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exe PID 1272 wrote to memory of 836 1272 zuato.exe dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exe PID 1272 wrote to memory of 836 1272 zuato.exe dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exe PID 1272 wrote to memory of 836 1272 zuato.exe dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exe PID 836 wrote to memory of 616 836 dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exe cmd.exe PID 836 wrote to memory of 616 836 dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exe cmd.exe PID 836 wrote to memory of 616 836 dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exe cmd.exe PID 836 wrote to memory of 616 836 dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exe cmd.exe PID 836 wrote to memory of 616 836 dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exe cmd.exe PID 836 wrote to memory of 616 836 dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exe cmd.exe PID 836 wrote to memory of 616 836 dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exe cmd.exe PID 836 wrote to memory of 616 836 dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exe cmd.exe PID 836 wrote to memory of 616 836 dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exe cmd.exe PID 1272 wrote to memory of 1200 1272 zuato.exe conhost.exe PID 1272 wrote to memory of 1200 1272 zuato.exe conhost.exe PID 1272 wrote to memory of 1200 1272 zuato.exe conhost.exe PID 1272 wrote to memory of 1200 1272 zuato.exe conhost.exe PID 1272 wrote to memory of 1200 1272 zuato.exe conhost.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1228
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exe"C:\Users\Admin\AppData\Local\Temp\dd96f70183fd6f9482243e04b02a75c66040bafa64f612aebc99b4302709f1d7.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\Quosy\zuato.exe"C:\Users\Admin\AppData\Local\Temp\Quosy\zuato.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\TZB70EC.bat"3⤵
- Deletes itself
PID:616
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1316
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1377475999838651538-16041656851852331524-1107243486-272541279-247004355-1491403262"1⤵PID:1200
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
341KB
MD51028c9141b0989662b7eb80318b98337
SHA12eec8e0bfcea77260675733c2c4e5893573831a7
SHA25641c0d56a0becbe920308278e0c53a158cce0e040f4c42f5ab027c3b219f0b0f1
SHA51277af81b1a84e03c70f37c551b9036dd35580f1dd8af59066d44424165fe1cec502f3f80236d10ef63c47e173d0f97b42dddcccd4256f4f4d15dc9a670dd4704b
-
Filesize
341KB
MD51028c9141b0989662b7eb80318b98337
SHA12eec8e0bfcea77260675733c2c4e5893573831a7
SHA25641c0d56a0becbe920308278e0c53a158cce0e040f4c42f5ab027c3b219f0b0f1
SHA51277af81b1a84e03c70f37c551b9036dd35580f1dd8af59066d44424165fe1cec502f3f80236d10ef63c47e173d0f97b42dddcccd4256f4f4d15dc9a670dd4704b
-
Filesize
274B
MD573c029b87eb657ab983ff8b0b351b5b3
SHA1149e8581e21eee3c4207e5accd115e1f6840bb16
SHA2568a085e21a8fffa0368d359c93af7d7a0b516a353ddf3abad51436c3642446794
SHA512e27ea65e07aeb449cde3bb6447b0a4305dc418f29de70447d5de59af6b33e80428beeb7a1056b304b16fb570cdbeaf3b63e866dee8fe2577414135bb0b02e7d0
-
Filesize
341KB
MD51028c9141b0989662b7eb80318b98337
SHA12eec8e0bfcea77260675733c2c4e5893573831a7
SHA25641c0d56a0becbe920308278e0c53a158cce0e040f4c42f5ab027c3b219f0b0f1
SHA51277af81b1a84e03c70f37c551b9036dd35580f1dd8af59066d44424165fe1cec502f3f80236d10ef63c47e173d0f97b42dddcccd4256f4f4d15dc9a670dd4704b