Analysis
-
max time kernel
130s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 09:30
Static task
static1
Behavioral task
behavioral1
Sample
ae7da76b3c43003a28e047ea732ca43ca1e60a93125bcccec7cbabea01503380.exe
Resource
win7-20220812-en
General
-
Target
ae7da76b3c43003a28e047ea732ca43ca1e60a93125bcccec7cbabea01503380.exe
-
Size
287KB
-
MD5
1433398929114793884388a444e30cb0
-
SHA1
6c5e225c71db39bbc36a14e90a033d28f80bdca8
-
SHA256
ae7da76b3c43003a28e047ea732ca43ca1e60a93125bcccec7cbabea01503380
-
SHA512
ccfa72fe409ab15c2b826049356fb4fbe71ae5dedb62db3b8e4231cf8c362d27d734852080ca9ee3cc25d98b2b3b06ed98c6d0c28f4c0aa9936bf3656ce2325e
-
SSDEEP
6144:99mnus6PYCTlUVT4pSMculOPyv7a4xveBq0XT8hkgRSU72aYwUU:uL6PtW4pjDkU9x2s0QWs7owL
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1888 zlo2.exe 1484 vpnium.exe -
Loads dropped DLL 2 IoCs
pid Process 1280 ae7da76b3c43003a28e047ea732ca43ca1e60a93125bcccec7cbabea01503380.exe 1280 ae7da76b3c43003a28e047ea732ca43ca1e60a93125bcccec7cbabea01503380.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 whatismyip.akamai.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString zlo2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier zlo2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 zlo2.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1888 zlo2.exe 1888 zlo2.exe 1888 zlo2.exe 1888 zlo2.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1484 vpnium.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1484 vpnium.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1280 wrote to memory of 1888 1280 ae7da76b3c43003a28e047ea732ca43ca1e60a93125bcccec7cbabea01503380.exe 28 PID 1280 wrote to memory of 1888 1280 ae7da76b3c43003a28e047ea732ca43ca1e60a93125bcccec7cbabea01503380.exe 28 PID 1280 wrote to memory of 1888 1280 ae7da76b3c43003a28e047ea732ca43ca1e60a93125bcccec7cbabea01503380.exe 28 PID 1280 wrote to memory of 1888 1280 ae7da76b3c43003a28e047ea732ca43ca1e60a93125bcccec7cbabea01503380.exe 28 PID 1280 wrote to memory of 1484 1280 ae7da76b3c43003a28e047ea732ca43ca1e60a93125bcccec7cbabea01503380.exe 29 PID 1280 wrote to memory of 1484 1280 ae7da76b3c43003a28e047ea732ca43ca1e60a93125bcccec7cbabea01503380.exe 29 PID 1280 wrote to memory of 1484 1280 ae7da76b3c43003a28e047ea732ca43ca1e60a93125bcccec7cbabea01503380.exe 29 PID 1280 wrote to memory of 1484 1280 ae7da76b3c43003a28e047ea732ca43ca1e60a93125bcccec7cbabea01503380.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae7da76b3c43003a28e047ea732ca43ca1e60a93125bcccec7cbabea01503380.exe"C:\Users\Admin\AppData\Local\Temp\ae7da76b3c43003a28e047ea732ca43ca1e60a93125bcccec7cbabea01503380.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\zlo2.exe"C:\Users\Admin\AppData\Local\Temp\zlo2.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1888
-
-
C:\Users\Admin\AppData\Local\Temp\vpnium.exe"C:\Users\Admin\AppData\Local\Temp\vpnium.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1484
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243KB
MD5fd3c4a2abcf3ade19747a5bbf9cabe13
SHA1ed7734b9725f2b0a4c07db8dcc12043c1c8d8941
SHA25632e1ff85e3e2bf53c740ccc7c42895bce60bce83e46c47b0826c81a336f15c42
SHA51247b383173535fb5cbbc4598681140ac6e8b80b4adbc80753d9df541073c44d6b5a384421e42aeb8d7d514e136f9207238c241200619bd76a271d7436f2a9e44c
-
Filesize
243KB
MD5fd3c4a2abcf3ade19747a5bbf9cabe13
SHA1ed7734b9725f2b0a4c07db8dcc12043c1c8d8941
SHA25632e1ff85e3e2bf53c740ccc7c42895bce60bce83e46c47b0826c81a336f15c42
SHA51247b383173535fb5cbbc4598681140ac6e8b80b4adbc80753d9df541073c44d6b5a384421e42aeb8d7d514e136f9207238c241200619bd76a271d7436f2a9e44c
-
Filesize
63KB
MD564ee6a336c3d8462df980eab38288aa8
SHA1042a9427d4b4b81d97e850714647b9277b2066e5
SHA256619ba8ba6bd272f9c0da176baad1e149d353ac6a571ffc67feaabbf4e5cacfdb
SHA512535d8e6223d2c788d5248edaa42b35365ee48565e9e4fedcc81608b4e6d2f56c0bee7f07e4ed16eb658b22aaeb9673aaaa5e46449f0654710e6a488d962ae4ed
-
Filesize
243KB
MD5fd3c4a2abcf3ade19747a5bbf9cabe13
SHA1ed7734b9725f2b0a4c07db8dcc12043c1c8d8941
SHA25632e1ff85e3e2bf53c740ccc7c42895bce60bce83e46c47b0826c81a336f15c42
SHA51247b383173535fb5cbbc4598681140ac6e8b80b4adbc80753d9df541073c44d6b5a384421e42aeb8d7d514e136f9207238c241200619bd76a271d7436f2a9e44c
-
Filesize
63KB
MD564ee6a336c3d8462df980eab38288aa8
SHA1042a9427d4b4b81d97e850714647b9277b2066e5
SHA256619ba8ba6bd272f9c0da176baad1e149d353ac6a571ffc67feaabbf4e5cacfdb
SHA512535d8e6223d2c788d5248edaa42b35365ee48565e9e4fedcc81608b4e6d2f56c0bee7f07e4ed16eb658b22aaeb9673aaaa5e46449f0654710e6a488d962ae4ed