Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 21:03
Static task
static1
Behavioral task
behavioral1
Sample
cbfc07b93b5235175fa1be85f33734519cc86cd95b3ab7b7e969021a4d667cb9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cbfc07b93b5235175fa1be85f33734519cc86cd95b3ab7b7e969021a4d667cb9.exe
Resource
win10v2004-20220901-en
General
-
Target
cbfc07b93b5235175fa1be85f33734519cc86cd95b3ab7b7e969021a4d667cb9.exe
-
Size
2.1MB
-
MD5
cce3d3c4438d88b70387f4ece9ad0077
-
SHA1
a8d7f61c743c1893595f04bbdbb5e3d84a21484f
-
SHA256
cbfc07b93b5235175fa1be85f33734519cc86cd95b3ab7b7e969021a4d667cb9
-
SHA512
a74329915f92ef27e7b7af1587b8ab21703a34476a20da0b199b7fbb25122c8cd674381ab3e919ea79b07a9fb24936e02374f9f1775d47b758a70486d6d710ae
-
SSDEEP
24576:HoBGtXTMCFh4Ejwed5z7cg/xt5b55BfV1CsPclEXcPH7c77KFc4BjUq5Du2/TBnu:H6BCged5ogZH5V1CpUq5uD4geufo
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
cbfc07b93b5235175fa1be85f33734519cc86cd95b3ab7b7e969021a4d667cb9.exedescription ioc process File created C:\Windows\SysWOW64\drivers\ZYwfp.sys cbfc07b93b5235175fa1be85f33734519cc86cd95b3ab7b7e969021a4d667cb9.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
cbfc07b93b5235175fa1be85f33734519cc86cd95b3ab7b7e969021a4d667cb9.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\netfilter2\ImagePath = "\\??\\C:\\Windows\\SysWOW64\\drivers\\ZYwfp.sys" cbfc07b93b5235175fa1be85f33734519cc86cd95b3ab7b7e969021a4d667cb9.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 472 -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
cbfc07b93b5235175fa1be85f33734519cc86cd95b3ab7b7e969021a4d667cb9.exepid process 1784 cbfc07b93b5235175fa1be85f33734519cc86cd95b3ab7b7e969021a4d667cb9.exe 1784 cbfc07b93b5235175fa1be85f33734519cc86cd95b3ab7b7e969021a4d667cb9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbfc07b93b5235175fa1be85f33734519cc86cd95b3ab7b7e969021a4d667cb9.exe"C:\Users\Admin\AppData\Local\Temp\cbfc07b93b5235175fa1be85f33734519cc86cd95b3ab7b7e969021a4d667cb9.exe"1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1784-54-0x00000000762F1000-0x00000000762F3000-memory.dmpFilesize
8KB