Analysis

  • max time kernel
    2s
  • max time network
    66s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-08-2023 18:12

General

  • Target

    Zeppelinbggaehbcdj18_browsingExe.exe

  • Size

    100KB

  • MD5

    cf5a358a22326f09fd55983bb812b7d8

  • SHA1

    1addcffae4fd4211ea24202783c2ffad6771aa34

  • SHA256

    dd89d939c941a53d6188232288a3bd73ba9baf0b4ca6bf6ccca697d9ee42533f

  • SHA512

    5e4129009c716286c9a2d85f846c75053d71251c9ab52f440da5a3f1a5cc6d9d7d795753bc7e37ef11353fb694f1c0991d127c28d6cd1188316623aa57cb2e5b

  • SSDEEP

    3072:ge2IWDaNiBBXtw4KLStagKwbzCcO8WWZ5:kIeoiBBXGLSYgZzCx8Wq5

Score
7/10

Malware Config

Signatures

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\Zeppelinbggaehbcdj18_browsingExe.exe
    "C:\Users\Admin\AppData\Local\Temp\Zeppelinbggaehbcdj18_browsingExe.exe"
    1⤵
    • Adds Run key to start application
    PID:3836
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe" -start
      2⤵
        PID:4664
      • C:\Windows\SysWOW64\notepad.exe
        notepad.exe
        2⤵
          PID:3132

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe

        Filesize

        100KB

        MD5

        cf5a358a22326f09fd55983bb812b7d8

        SHA1

        1addcffae4fd4211ea24202783c2ffad6771aa34

        SHA256

        dd89d939c941a53d6188232288a3bd73ba9baf0b4ca6bf6ccca697d9ee42533f

        SHA512

        5e4129009c716286c9a2d85f846c75053d71251c9ab52f440da5a3f1a5cc6d9d7d795753bc7e37ef11353fb694f1c0991d127c28d6cd1188316623aa57cb2e5b

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe

        Filesize

        100KB

        MD5

        cf5a358a22326f09fd55983bb812b7d8

        SHA1

        1addcffae4fd4211ea24202783c2ffad6771aa34

        SHA256

        dd89d939c941a53d6188232288a3bd73ba9baf0b4ca6bf6ccca697d9ee42533f

        SHA512

        5e4129009c716286c9a2d85f846c75053d71251c9ab52f440da5a3f1a5cc6d9d7d795753bc7e37ef11353fb694f1c0991d127c28d6cd1188316623aa57cb2e5b

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe

        Filesize

        100KB

        MD5

        cf5a358a22326f09fd55983bb812b7d8

        SHA1

        1addcffae4fd4211ea24202783c2ffad6771aa34

        SHA256

        dd89d939c941a53d6188232288a3bd73ba9baf0b4ca6bf6ccca697d9ee42533f

        SHA512

        5e4129009c716286c9a2d85f846c75053d71251c9ab52f440da5a3f1a5cc6d9d7d795753bc7e37ef11353fb694f1c0991d127c28d6cd1188316623aa57cb2e5b

      • memory/3132-145-0x0000000000EE0000-0x0000000000EE1000-memory.dmp

        Filesize

        4KB

      • memory/3836-133-0x0000000000400000-0x0000000000546000-memory.dmp

        Filesize

        1.3MB

      • memory/4664-144-0x0000000000400000-0x0000000000546000-memory.dmp

        Filesize

        1.3MB