Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2023 00:02
Behavioral task
behavioral1
Sample
Zeus 0.2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Zeus 0.2.exe
Resource
win10v2004-20230220-en
General
-
Target
Zeus 0.2.exe
-
Size
18.2MB
-
MD5
1e97f6146a4c217ec9a28bfaee9fea07
-
SHA1
6d3c051502dd24e6ff671dea5e973eb08108c3f6
-
SHA256
72f4ad18fe9b73073d10ea4b8efea0f0f9c148e823388dc7fda4677b28a5dc69
-
SHA512
4bf7846b8bc33a7444b5db464be85f593432dd8578cedeb332227e4b746ee67160f0dda57dc7c637c79da060cfa2a4a445d296ea6f3c7ad9a7fb851966fc081e
-
SSDEEP
393216:aGpv+yh9ROf731uB74xoB+yyBhQFMgqS0XvZSVP0Feh1Kc:7vl473C4okPLQCgpIY1yc
Malware Config
Signatures
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral2/memory/4468-133-0x00000000003E0000-0x00000000027E6000-memory.dmp net_reactor -
Processes:
resource yara_rule behavioral2/memory/4468-133-0x00000000003E0000-0x00000000027E6000-memory.dmp vmprotect -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
taskmgr.exepid process 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 4200 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 4200 taskmgr.exe Token: SeSystemProfilePrivilege 4200 taskmgr.exe Token: SeCreateGlobalPrivilege 4200 taskmgr.exe Token: SeSecurityPrivilege 4200 taskmgr.exe Token: SeTakeOwnershipPrivilege 4200 taskmgr.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
Processes:
taskmgr.exepid process 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe -
Suspicious use of SendNotifyMessage 41 IoCs
Processes:
taskmgr.exepid process 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe 4200 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Zeus 0.2.exe"C:\Users\Admin\AppData\Local\Temp\Zeus 0.2.exe"1⤵
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4200-149-0x0000028E3E3E0000-0x0000028E3E3E1000-memory.dmpFilesize
4KB
-
memory/4200-141-0x0000028E3E3E0000-0x0000028E3E3E1000-memory.dmpFilesize
4KB
-
memory/4200-142-0x0000028E3E3E0000-0x0000028E3E3E1000-memory.dmpFilesize
4KB
-
memory/4200-151-0x0000028E3E3E0000-0x0000028E3E3E1000-memory.dmpFilesize
4KB
-
memory/4200-143-0x0000028E3E3E0000-0x0000028E3E3E1000-memory.dmpFilesize
4KB
-
memory/4200-153-0x0000028E3E3E0000-0x0000028E3E3E1000-memory.dmpFilesize
4KB
-
memory/4200-152-0x0000028E3E3E0000-0x0000028E3E3E1000-memory.dmpFilesize
4KB
-
memory/4200-147-0x0000028E3E3E0000-0x0000028E3E3E1000-memory.dmpFilesize
4KB
-
memory/4200-150-0x0000028E3E3E0000-0x0000028E3E3E1000-memory.dmpFilesize
4KB
-
memory/4200-148-0x0000028E3E3E0000-0x0000028E3E3E1000-memory.dmpFilesize
4KB
-
memory/4468-138-0x0000000007F20000-0x0000000007F2A000-memory.dmpFilesize
40KB
-
memory/4468-137-0x0000000007D90000-0x0000000007E22000-memory.dmpFilesize
584KB
-
memory/4468-133-0x00000000003E0000-0x00000000027E6000-memory.dmpFilesize
36.0MB
-
memory/4468-135-0x00000000072B0000-0x00000000072C0000-memory.dmpFilesize
64KB
-
memory/4468-139-0x00000000072B0000-0x00000000072C0000-memory.dmpFilesize
64KB
-
memory/4468-134-0x0000000004BF0000-0x0000000004BF1000-memory.dmpFilesize
4KB
-
memory/4468-136-0x00000000082A0000-0x0000000008844000-memory.dmpFilesize
5.6MB