Analysis
-
max time kernel
24s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 08:35
Static task
static1
Behavioral task
behavioral1
Sample
a63d6fd2f952ab23b437896e6f44547d2f47aad3cc63e2cf05d87594da19f61d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a63d6fd2f952ab23b437896e6f44547d2f47aad3cc63e2cf05d87594da19f61d.exe
Resource
win10v2004-20220812-en
General
-
Target
a63d6fd2f952ab23b437896e6f44547d2f47aad3cc63e2cf05d87594da19f61d.exe
-
Size
10KB
-
MD5
4f66d6c7cd724dfe24f86a5d55fe9b71
-
SHA1
ef7a5c84c051e2aa33c477e5e4a9a031bf7afef0
-
SHA256
a63d6fd2f952ab23b437896e6f44547d2f47aad3cc63e2cf05d87594da19f61d
-
SHA512
d768b9b37703ae45b6e55b9957af0a0a6a8f9e4ae93d036913365c24a0e20a95cf03888d063f09ddfe9ec757187b1af587c25b827f2d63e39b263b09b181ddb3
-
SSDEEP
192:N8GumbEQnSQcZUqxgeHxWSGiGVDEh3nLVDGvHEKE1LBV4G9DXWAB4WaQm:N8VmbEdQ86sVcH9Ub4GlWk6
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 1620 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1888 a63d6fd2f952ab23b437896e6f44547d2f47aad3cc63e2cf05d87594da19f61d.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\tzm.cfg a63d6fd2f952ab23b437896e6f44547d2f47aad3cc63e2cf05d87594da19f61d.exe File opened for modification C:\Windows\SysWOW64\tzm.dll a63d6fd2f952ab23b437896e6f44547d2f47aad3cc63e2cf05d87594da19f61d.exe File created C:\Windows\SysWOW64\tzm.dll a63d6fd2f952ab23b437896e6f44547d2f47aad3cc63e2cf05d87594da19f61d.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1888 a63d6fd2f952ab23b437896e6f44547d2f47aad3cc63e2cf05d87594da19f61d.exe 1888 a63d6fd2f952ab23b437896e6f44547d2f47aad3cc63e2cf05d87594da19f61d.exe 1888 a63d6fd2f952ab23b437896e6f44547d2f47aad3cc63e2cf05d87594da19f61d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1888 a63d6fd2f952ab23b437896e6f44547d2f47aad3cc63e2cf05d87594da19f61d.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1888 wrote to memory of 1276 1888 a63d6fd2f952ab23b437896e6f44547d2f47aad3cc63e2cf05d87594da19f61d.exe 16 PID 1888 wrote to memory of 1620 1888 a63d6fd2f952ab23b437896e6f44547d2f47aad3cc63e2cf05d87594da19f61d.exe 28 PID 1888 wrote to memory of 1620 1888 a63d6fd2f952ab23b437896e6f44547d2f47aad3cc63e2cf05d87594da19f61d.exe 28 PID 1888 wrote to memory of 1620 1888 a63d6fd2f952ab23b437896e6f44547d2f47aad3cc63e2cf05d87594da19f61d.exe 28 PID 1888 wrote to memory of 1620 1888 a63d6fd2f952ab23b437896e6f44547d2f47aad3cc63e2cf05d87594da19f61d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a63d6fd2f952ab23b437896e6f44547d2f47aad3cc63e2cf05d87594da19f61d.exe"C:\Users\Admin\AppData\Local\Temp\a63d6fd2f952ab23b437896e6f44547d2f47aad3cc63e2cf05d87594da19f61d.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\a63d6fd2f952ab23b437896e6f44547d2f47aad3cc63e2cf05d87594da19f61d.exe"2⤵
- Deletes itself
PID:1620
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1276
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD55dc5b19a10bff060920cfe770561559e
SHA1f83c9bfbaf2a3f096fe5ec1b4ea27a5e13c627c8
SHA256c783b16ae093373d56dc78ab3883b79cc3d6d838a3395ab6a8af576495397130
SHA512e744a52d0a608bd795f6ef1244fd46b453c71a59eb49d413126a084fb7c5a60c972abb1dd6ea189aa227505e2635423350b5000cf1b0dc38e16228f64af1e869