Analysis

  • max time kernel
    110s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 16:34

General

  • Target

    ZBL1211.exe

  • Size

    1.0MB

  • MD5

    28e5176f4c546fc69f0477016dc33bea

  • SHA1

    5f6ec6d8733967005d30630c1363acb5680abdb1

  • SHA256

    7e444455e23087f0c1e5dd1649bea3b6758f238c1192a8440069756be91c2f8f

  • SHA512

    e43bb6530667e7bf22712f4c76f4cc1c440a9cbadbe2789e86838764cc00617ae023e50a2099b8f3d6a1c781ae686b06040bcd8ec705b9b0856bbab7900d7d29

  • SSDEEP

    24576:5y6xUTMFEyW3NGk8rPjgyfNiD2YuXqdjO498U1NiFznHm:M2REyMUNrV/YCqdjOu/0zG

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 26 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ZBL1211.exe
    "C:\Users\Admin\AppData\Local\Temp\ZBL1211.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1360
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.zblwg.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:964
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:964 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:688

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\R7SKE2OH.txt

    Filesize

    608B

    MD5

    07e0c4fb1372c76e8780d5f4a91d33f3

    SHA1

    43d228b476d0e9455d5de30d19c8a38cf385a796

    SHA256

    a124ef10fb50fff009afd7f5cdb95c0ddbbdc5cce9b3a2f24789146a1eef12cc

    SHA512

    ee3c2e6e600f98f1c44a203f46a27066f489e01ca857e74cf940783b96a2865493d3203695b1629c1fda878cc7847bf65ea0a88d09e511ac0b505e632143d83e

  • memory/1360-93-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1360-55-0x0000000000400000-0x00000000007E3000-memory.dmp

    Filesize

    3.9MB

  • memory/1360-89-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1360-60-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1360-61-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1360-62-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1360-63-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1360-65-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1360-67-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1360-71-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1360-75-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1360-77-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1360-83-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1360-85-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1360-58-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1360-95-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1360-57-0x0000000000400000-0x00000000007E3000-memory.dmp

    Filesize

    3.9MB

  • memory/1360-99-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1360-103-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1360-101-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1360-97-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1360-91-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1360-87-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1360-81-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1360-79-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1360-73-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1360-69-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1360-104-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1360-105-0x0000000000400000-0x00000000007E3000-memory.dmp

    Filesize

    3.9MB

  • memory/1360-106-0x0000000000400000-0x00000000007E3000-memory.dmp

    Filesize

    3.9MB

  • memory/1360-54-0x00000000751A1000-0x00000000751A3000-memory.dmp

    Filesize

    8KB