Analysis
-
max time kernel
131s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 17:19
Static task
static1
Behavioral task
behavioral1
Sample
1a0d22cb06eb4cb2e046090620edd89caf655f19dd3ceb50ac0b7e5b7be4ddd1.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1a0d22cb06eb4cb2e046090620edd89caf655f19dd3ceb50ac0b7e5b7be4ddd1.exe
Resource
win10v2004-20230915-en
General
-
Target
1a0d22cb06eb4cb2e046090620edd89caf655f19dd3ceb50ac0b7e5b7be4ddd1.exe
-
Size
1.4MB
-
MD5
c37111f4c9f6d3c6d34fc462ae23f556
-
SHA1
492f0367621ec0e82f75d802c418f8f287be1306
-
SHA256
1a0d22cb06eb4cb2e046090620edd89caf655f19dd3ceb50ac0b7e5b7be4ddd1
-
SHA512
68aaec3a78ddb532f7dd22d537b64284e19874e6e2b2fbd66802db88a72e973c8f974e29f1e9ea7db378d37bec3ee22254aa709e83f97f0d4b4c3aed8706571f
-
SSDEEP
24576:8aBOENN5HpKuJM2WbO72JWNs4cJlztMqAFGGFFADxrz2hXCRTEtIzkM1EZSA4UZG:8gJJM2WC74We4ctMqAFJFaDlz2h+TEth
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run pmzzmbhyupplorzoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pmzzmbhyupplorzoj = "C:\\ProgramData\\zegpxnokg\\pmzzmbhyupplorzoj.exe" pmzzmbhyupplorzoj.exe -
resource yara_rule behavioral1/files/0x0030000000015c4b-7.dat aspack_v212_v242 behavioral1/files/0x0030000000015c4b-8.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2660 pmzzmbhyupplorzoj.exe -
Loads dropped DLL 3 IoCs
pid Process 2576 cmd.exe 2660 pmzzmbhyupplorzoj.exe 2660 pmzzmbhyupplorzoj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2660 pmzzmbhyupplorzoj.exe 2660 pmzzmbhyupplorzoj.exe 2660 pmzzmbhyupplorzoj.exe 2660 pmzzmbhyupplorzoj.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2660 pmzzmbhyupplorzoj.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1920 1a0d22cb06eb4cb2e046090620edd89caf655f19dd3ceb50ac0b7e5b7be4ddd1.exe 2660 pmzzmbhyupplorzoj.exe 2660 pmzzmbhyupplorzoj.exe 2660 pmzzmbhyupplorzoj.exe 2660 pmzzmbhyupplorzoj.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1920 wrote to memory of 2960 1920 1a0d22cb06eb4cb2e046090620edd89caf655f19dd3ceb50ac0b7e5b7be4ddd1.exe 28 PID 1920 wrote to memory of 2960 1920 1a0d22cb06eb4cb2e046090620edd89caf655f19dd3ceb50ac0b7e5b7be4ddd1.exe 28 PID 1920 wrote to memory of 2960 1920 1a0d22cb06eb4cb2e046090620edd89caf655f19dd3ceb50ac0b7e5b7be4ddd1.exe 28 PID 1920 wrote to memory of 2960 1920 1a0d22cb06eb4cb2e046090620edd89caf655f19dd3ceb50ac0b7e5b7be4ddd1.exe 28 PID 1920 wrote to memory of 2576 1920 1a0d22cb06eb4cb2e046090620edd89caf655f19dd3ceb50ac0b7e5b7be4ddd1.exe 30 PID 1920 wrote to memory of 2576 1920 1a0d22cb06eb4cb2e046090620edd89caf655f19dd3ceb50ac0b7e5b7be4ddd1.exe 30 PID 1920 wrote to memory of 2576 1920 1a0d22cb06eb4cb2e046090620edd89caf655f19dd3ceb50ac0b7e5b7be4ddd1.exe 30 PID 1920 wrote to memory of 2576 1920 1a0d22cb06eb4cb2e046090620edd89caf655f19dd3ceb50ac0b7e5b7be4ddd1.exe 30 PID 2576 wrote to memory of 2660 2576 cmd.exe 32 PID 2576 wrote to memory of 2660 2576 cmd.exe 32 PID 2576 wrote to memory of 2660 2576 cmd.exe 32 PID 2576 wrote to memory of 2660 2576 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a0d22cb06eb4cb2e046090620edd89caf655f19dd3ceb50ac0b7e5b7be4ddd1.exe"C:\Users\Admin\AppData\Local\Temp\1a0d22cb06eb4cb2e046090620edd89caf655f19dd3ceb50ac0b7e5b7be4ddd1.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c md C:\ProgramData\zegpxnokg2⤵PID:2960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start C:\ProgramData\zegpxnokg\pmzzmbhyupplorzoj.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\ProgramData\zegpxnokg\pmzzmbhyupplorzoj.exeC:\ProgramData\zegpxnokg\pmzzmbhyupplorzoj.exe3⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2660
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
755KB
MD5bf38660a9125935658cfa3e53fdc7d65
SHA10b51fb415ec89848f339f8989d323bea722bfd70
SHA25660c06e0fa4449314da3a0a87c1a9d9577df99226f943637e06f61188e5862efa
SHA51225f521ffe25a950d0f1a4de63b04cb62e2a3b0e72e7405799586913208bf8f8fa52aa34e96a9cc6ee47afcd41870f3aa0cd8289c53461d1b6e792d19b750c9a1
-
Filesize
427KB
MD56ac64a36c9d84bfa838bb11dc1b780ee
SHA175620aeb07429911671d612332adce6ce8992b9d
SHA2565a013d9775c669851048c996abf8e98d91daada683ae08427d4fc5f94bdecf71
SHA512e2f8ab6544f1f0c4ec279134f456490c997157f07db8b1239ba1c7fc53fea6cd9da6033e409a7377d8b6a5b2eb38a54a8fd4b9ebedd6d3b29df394bd3113a769
-
Filesize
16KB
MD5973b4b2658796840ad6ff9ac1cb21383
SHA12ae4808a1d7e450707a9f928ea13cd73e5040431
SHA256f671045566c60930dc459aa30e2bb38f25525e670bf72f7b69c1f918ae3d9565
SHA51242e313fae2f84c6ecc7b5c2c4178bcbcf3043fd239d9b05f5614b64e2d8841a7fe54a0786c1b5752bb1b54079b9873d6ade63e7b00cb4118a007d3d0360d6b4c
-
Filesize
16KB
MD5973b4b2658796840ad6ff9ac1cb21383
SHA12ae4808a1d7e450707a9f928ea13cd73e5040431
SHA256f671045566c60930dc459aa30e2bb38f25525e670bf72f7b69c1f918ae3d9565
SHA51242e313fae2f84c6ecc7b5c2c4178bcbcf3043fd239d9b05f5614b64e2d8841a7fe54a0786c1b5752bb1b54079b9873d6ade63e7b00cb4118a007d3d0360d6b4c
-
Filesize
914B
MD539ebf9b2d8867f24c034dafb79ab6897
SHA1355a1d504477435e89d188b9d50e8528c2285835
SHA256758f1725f918a4f1c49ea27fbf9ac052780c297adb5512f2fbc281643115ef6c
SHA512150937852151a4b482667560c7d548ba18024e95abd862d612799c41134f7390589b240da3c2f8d539e75be214f990e14d0b6fc13408a53cee33faea408e732e
-
Filesize
427KB
MD56ac64a36c9d84bfa838bb11dc1b780ee
SHA175620aeb07429911671d612332adce6ce8992b9d
SHA2565a013d9775c669851048c996abf8e98d91daada683ae08427d4fc5f94bdecf71
SHA512e2f8ab6544f1f0c4ec279134f456490c997157f07db8b1239ba1c7fc53fea6cd9da6033e409a7377d8b6a5b2eb38a54a8fd4b9ebedd6d3b29df394bd3113a769
-
Filesize
755KB
MD5bf38660a9125935658cfa3e53fdc7d65
SHA10b51fb415ec89848f339f8989d323bea722bfd70
SHA25660c06e0fa4449314da3a0a87c1a9d9577df99226f943637e06f61188e5862efa
SHA51225f521ffe25a950d0f1a4de63b04cb62e2a3b0e72e7405799586913208bf8f8fa52aa34e96a9cc6ee47afcd41870f3aa0cd8289c53461d1b6e792d19b750c9a1
-
Filesize
16KB
MD5973b4b2658796840ad6ff9ac1cb21383
SHA12ae4808a1d7e450707a9f928ea13cd73e5040431
SHA256f671045566c60930dc459aa30e2bb38f25525e670bf72f7b69c1f918ae3d9565
SHA51242e313fae2f84c6ecc7b5c2c4178bcbcf3043fd239d9b05f5614b64e2d8841a7fe54a0786c1b5752bb1b54079b9873d6ade63e7b00cb4118a007d3d0360d6b4c