Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 05:09
Static task
static1
Behavioral task
behavioral1
Sample
b9cb39c7c8616642cd973437f2a0889d36281c56a3471db1ed00503aeb94ad78.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b9cb39c7c8616642cd973437f2a0889d36281c56a3471db1ed00503aeb94ad78.exe
Resource
win10v2004-20220812-en
General
-
Target
b9cb39c7c8616642cd973437f2a0889d36281c56a3471db1ed00503aeb94ad78.exe
-
Size
149KB
-
MD5
5cbed999c7ae9fdb61532610f890e807
-
SHA1
812c5a51c138a314ead616bf167871be4c9204f0
-
SHA256
b9cb39c7c8616642cd973437f2a0889d36281c56a3471db1ed00503aeb94ad78
-
SHA512
4000d9ac439945ab87f5a5318013a2021c1005b879162cd366dc91baf2ba303f527756119846592251aa49d5965fd59522b6318aab77ef684e980ada886d6d34
-
SSDEEP
3072:ZyYIrQkrnHI6tZeSTiNeCwc48HYduSXO1DFIy:4k6Hhekc48HYJXe
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4988 Zcucia.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Zcucia.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Zcucia.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job b9cb39c7c8616642cd973437f2a0889d36281c56a3471db1ed00503aeb94ad78.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job b9cb39c7c8616642cd973437f2a0889d36281c56a3471db1ed00503aeb94ad78.exe File created C:\Windows\Zcucia.exe b9cb39c7c8616642cd973437f2a0889d36281c56a3471db1ed00503aeb94ad78.exe File opened for modification C:\Windows\Zcucia.exe b9cb39c7c8616642cd973437f2a0889d36281c56a3471db1ed00503aeb94ad78.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main Zcucia.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\International Zcucia.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe 4988 Zcucia.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2148 wrote to memory of 4988 2148 b9cb39c7c8616642cd973437f2a0889d36281c56a3471db1ed00503aeb94ad78.exe 80 PID 2148 wrote to memory of 4988 2148 b9cb39c7c8616642cd973437f2a0889d36281c56a3471db1ed00503aeb94ad78.exe 80 PID 2148 wrote to memory of 4988 2148 b9cb39c7c8616642cd973437f2a0889d36281c56a3471db1ed00503aeb94ad78.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9cb39c7c8616642cd973437f2a0889d36281c56a3471db1ed00503aeb94ad78.exe"C:\Users\Admin\AppData\Local\Temp\b9cb39c7c8616642cd973437f2a0889d36281c56a3471db1ed00503aeb94ad78.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\Zcucia.exeC:\Windows\Zcucia.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
426B
MD5d9b4cbd5fb6764e3d347dad047fd8007
SHA1f18a0e7c5cd13e18c15a295e27d038b3cc9f0a0c
SHA256716eaf7f99a97018c5d2252468e267a8263a50c80ee1e9735a9f54abd0dab975
SHA5125aeff0be8dfc63bfd830b6d42f0fb3506ba56c6880ed19fa93cf450893106c00323d147b47c5d5eeec3140ccb30c0685369fb4fd74b0d3fb6b72cc978168b2e0
-
Filesize
149KB
MD55cbed999c7ae9fdb61532610f890e807
SHA1812c5a51c138a314ead616bf167871be4c9204f0
SHA256b9cb39c7c8616642cd973437f2a0889d36281c56a3471db1ed00503aeb94ad78
SHA5124000d9ac439945ab87f5a5318013a2021c1005b879162cd366dc91baf2ba303f527756119846592251aa49d5965fd59522b6318aab77ef684e980ada886d6d34
-
Filesize
149KB
MD55cbed999c7ae9fdb61532610f890e807
SHA1812c5a51c138a314ead616bf167871be4c9204f0
SHA256b9cb39c7c8616642cd973437f2a0889d36281c56a3471db1ed00503aeb94ad78
SHA5124000d9ac439945ab87f5a5318013a2021c1005b879162cd366dc91baf2ba303f527756119846592251aa49d5965fd59522b6318aab77ef684e980ada886d6d34