Overview
overview
7Static
static
7DISP.exe
windows7-x64
1DISP.exe
windows10-2004-x64
1LX.exe
windows7-x64
1LX.exe
windows10-2004-x64
1SnoConnector.exe
windows7-x64
1SnoConnector.exe
windows10-2004-x64
1lxextr.exe
windows7-x64
1lxextr.exe
windows10-2004-x64
1lxsmartstrip.exe
windows7-x64
1lxsmartstrip.exe
windows10-2004-x64
1sno_ui.exe
windows7-x64
1sno_ui.exe
windows10-2004-x64
1InstallerD...te.jar
windows7-x64
1InstallerD...te.jar
windows10-2004-x64
1InstallerD...es.jar
windows7-x64
1InstallerD...es.jar
windows10-2004-x64
1Windows/install.exe
windows7-x64
7Windows/install.exe
windows10-2004-x64
7Windows/msvcrt.dll
windows7-x64
3Windows/msvcrt.dll
windows10-2004-x64
3Windows/re...er.exe
windows7-x64
1Windows/re...er.exe
windows10-2004-x64
1Windows/re...32.dll
windows7-x64
1Windows/re...32.dll
windows10-2004-x64
3Windows/re...ue.jar
windows7-x64
1Windows/re...ue.jar
windows10-2004-x64
1Windows/re...SE.rtf
windows7-x64
4Windows/re...SE.rtf
windows10-2004-x64
1Windows/re...de.rtf
windows7-x64
4Windows/re...de.rtf
windows10-2004-x64
1Windows/re...es.rtf
windows7-x64
4Windows/re...es.rtf
windows10-2004-x64
1Analysis
-
max time kernel
153s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13-05-2023 03:41
Behavioral task
behavioral1
Sample
DISP.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
DISP.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
LX.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
LX.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
SnoConnector.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
SnoConnector.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
lxextr.exe
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
lxextr.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
lxsmartstrip.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
lxsmartstrip.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
sno_ui.exe
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
sno_ui.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
InstallerData/Execute.jar
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
InstallerData/Execute.jar
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
InstallerData/IAClasses.jar
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
InstallerData/IAClasses.jar
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
Windows/install.exe
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
Windows/install.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral19
Sample
Windows/msvcrt.dll
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
Windows/msvcrt.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
Windows/resource/ZGWin32LaunchHelper.exe
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
Windows/resource/ZGWin32LaunchHelper.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
Windows/resource/iawin32.dll
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
Windows/resource/iawin32.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral25
Sample
Windows/resource/jdglue.jar
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
Windows/resource/jdglue.jar
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
Windows/resource/jre/LICENSE.rtf
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
Windows/resource/jre/LICENSE.rtf
Resource
win10v2004-20230220-en
Behavioral task
behavioral29
Sample
Windows/resource/jre/LICENSE_de.rtf
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
Windows/resource/jre/LICENSE_de.rtf
Resource
win10v2004-20230220-en
Behavioral task
behavioral31
Sample
Windows/resource/jre/LICENSE_es.rtf
Resource
win7-20230220-en
Behavioral task
behavioral32
Sample
Windows/resource/jre/LICENSE_es.rtf
Resource
win10v2004-20230221-en
General
-
Target
Windows/install.exe
-
Size
110KB
-
MD5
6f02b91897c4610e024544e035116ac2
-
SHA1
14e4779a095cfdc44e34219f6f6004e76c6f12c2
-
SHA256
f63dc2a1d4dba23d5acec28af65f8cc3419584419c09689e170e1ae83bf5d6a4
-
SHA512
39be399617ae0b402a4354754a2d57efec65cd6b661658b51662263c5aaa3210d3b6f44894b059670ffac3a34526060a82a1821075ad2eba50b96e449dc1cb74
-
SSDEEP
1536:II8xTv4Wc8MWOwuatcswxdmhI78fhU0YKfOVEQVh4vTLUtYxVfl5HHXiDyoZoFuB:II8GMtiPyfGSfON/A0tqfvHHyDyWoH0
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral17/memory/1268-66-0x0000000000400000-0x0000000000442000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
javaw.exepid process 1220 javaw.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
install.exedescription pid process target process PID 1268 wrote to memory of 1220 1268 install.exe javaw.exe PID 1268 wrote to memory of 1220 1268 install.exe javaw.exe PID 1268 wrote to memory of 1220 1268 install.exe javaw.exe PID 1268 wrote to memory of 1220 1268 install.exe javaw.exe PID 1268 wrote to memory of 1220 1268 install.exe javaw.exe PID 1268 wrote to memory of 1220 1268 install.exe javaw.exe PID 1268 wrote to memory of 1220 1268 install.exe javaw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Windows\install.exe"C:\Users\Admin\AppData\Local\Temp\Windows\install.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\Windows\resource\jre\bin\javaw.exe"C:\Users\Admin\AppData\Local\Temp\Windows\resource\jre\bin\javaw.exe" -Xms16777216 -Xmx50331648 -classpath "C:\Users\Admin\AppData\Local\Temp\InstallerData\IAClasses.zip;C:\Users\Admin\AppData\Local\Temp\Windows\resource\jdglue.zip;C:\Users\Admin\AppData\Local\Temp\InstallerData\Execute.zip;C:\Users\Admin\AppData\Local\Temp\Windows\InstallerData\Execute.zip;C:\Users\Admin\AppData\Local\Temp\InstallerData\Resource1.zip;C:\Users\Admin\AppData\Local\Temp\Windows\InstallerData\Resource1.zip;C:\Users\Admin\AppData\Local\Temp\InstallerData;C:\Users\Admin\AppData\Local\Temp\Windows\InstallerData;" com.zerog.lax.LAX "C:/Users/Admin/AppData/Local/Temp/Windows/install.lax" "C:/Users/Admin/AppData/Local/Temp/lax1D90.tmp"2⤵
- Suspicious use of SetWindowsHookEx
PID:1220
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5f266641fa17b544fccca81d184ea4cba
SHA16d96ff792e17ead4bd4e4d8881c3c5559b71d9c1
SHA25602ca38bd86f8d8490fc3131299570861a4ee62e7b4bb12bbe4a61cf3ff871a91
SHA51299999a8840d607e2c21c8e047da6cced2fcc246be3748594a57ecb112ee41ddec77ef2da45b754874f27a0f66ed21da8b03871d634fe20641f0a44def9226428