Analysis

  • max time kernel
    151s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2023, 17:17

General

  • Target

    06f7a27e9e7b39efc723ab7c10e0358d.exe

  • Size

    29KB

  • MD5

    06f7a27e9e7b39efc723ab7c10e0358d

  • SHA1

    76ac17ee68a512db1ecd84a4c2fd9ba4da100503

  • SHA256

    8212362882d88e6b4d10ae27a5933d892cc12925002ec72390a2c9e1f4b3a95b

  • SHA512

    d10cdaa4cd18857c6182411aecacf902286661c2c0d9eaaa13a5af1a7ef37803a0d98352b913039337e3cfd81bf233c5f50f0d68217593a0d64181d5e1743c71

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/9:AEwVs+0jNDY1qi/ql

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06f7a27e9e7b39efc723ab7c10e0358d.exe
    "C:\Users\Admin\AppData\Local\Temp\06f7a27e9e7b39efc723ab7c10e0358d.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4916
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:3404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\B5FYTYSL\search[1].htm

    Filesize

    25B

    MD5

    8ba61a16b71609a08bfa35bc213fce49

    SHA1

    8374dddcc6b2ede14b0ea00a5870a11b57ced33f

    SHA256

    6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

    SHA512

    5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BRUT4RU0\default[3].htm

    Filesize

    304B

    MD5

    4d1a10f22e8332513741877c47ac8970

    SHA1

    f68ecc13b7a71e948c6d137be985138586deb726

    SHA256

    a0dbc1b7d129cfa07a5d324fb03e41717fbdd17be3903e7e3fd7f21878dfbba4

    SHA512

    4f1e447c41f5b694bf2bff7f21a73f2bce00dfc844d3c7722ade44249d5ac4b50cf0319630b7f3fdb890bbd76528b6d0ed6b5ad98867d09cd90dcfbfd8b96860

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\J9NF6NB1\default[1].htm

    Filesize

    304B

    MD5

    605de1f61d0446f81e63c25750e99301

    SHA1

    0eaf9121f9dc1338807a511f92ea0b30dc2982a5

    SHA256

    049f75dee036da00f8c8366d29ee14268239df75b8be53aa104aec22b84560f0

    SHA512

    a6a2505b8b89a895922ad6dc06d2ce620cb51cc6582c1b7e498a9f1ee1e4e47c53ebc4f92f8aa37532d558667225e30574732c9fe7187153a262c933893e4285

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\J9NF6NB1\default[8].htm

    Filesize

    308B

    MD5

    5243568476eb2052b2f3b67dc9053e86

    SHA1

    b126aa6506772f9024b76580bdf28b45e3a7f051

    SHA256

    2d458622dc76eb87e44cc7db89309efdf50f99821145ae86864fd1b714cbaa80

    SHA512

    3c68cef4e3daa4bca6e8b3aa5a31874be1e4dec38fe9781c6fe4890980744527d0c6818eeb519f8e6b322118e1f08302d85972fa7da4ba8be9421aabf9a77833

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XV93K3MB\default[3].htm

    Filesize

    302B

    MD5

    51b86971925c7d24d895ff89fdebc8f5

    SHA1

    d037148e50a77f0de8421e0ef81f87f9f73570da

    SHA256

    3b50a39db6499f5cb2d3b6cec01daa5c33fcf80c0722707c6014e23ed1577280

    SHA512

    1bc88174ee963971ca43e106828d9e74473cf1aa664f6d4fa43ec9631610ab4c1dc9a0c84f5c89dd2b627eaf64f57dee99eca84b88eb14c36bf7285cb9d7f0c4

  • C:\Users\Admin\AppData\Local\Temp\tmp1739.tmp

    Filesize

    29KB

    MD5

    2e39afeb66b50f2be04f1f40df65fa05

    SHA1

    74ef9dd47d3ab910a1e5e866d1b3a2c0f78106e9

    SHA256

    789cc7ddf1bd8fac641a7ba1a536673c15c5f5c9e135596f1b5b84cacd09aaec

    SHA512

    ebcd66a5880447801436ecd31feff5e4a66fbf05dfe1cd865d52ccc82336a075c069c43b51783b9d806542b965d34dac187918e3e5ee12d3b93e08b23b01e77c

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    320B

    MD5

    0661bd8109e744de7ab12cf61bea1108

    SHA1

    3977638c2846cce13e9f37c25bdfba6a65223c0d

    SHA256

    f8c965d47d6db6231687586438cce4069a73f227f0c2ebb948d577a80fa60cf7

    SHA512

    d406011fe65dffba33aad56e18a053ef4e4ddb2cf24bb9858b79454859f070f0f14b266c143d77b66c0d3f14ddcafed7d730698358dc439f4571d2c26d9077ed

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    320B

    MD5

    31301fc28beec4e8c7c19ad3c0ece38a

    SHA1

    71adf67852c9a06d8cc175da9ec8f64d529340d9

    SHA256

    98457c8db0228146d8fd5f5cd1cd775bb62faae6813c90255b9601d38abbefdd

    SHA512

    149871af83f49c64bbf0e20553bdf1eea4e45b3c4174f0ef942292939697ce153f3ede6976cdc4812ef25536632b914858ebfd5944449ce1dd128f8237a1d8c3

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    320B

    MD5

    f3e9a495572e66e0526b2ff0a9c40af0

    SHA1

    192991f71e058420d28f9483f28e164038dc11e8

    SHA256

    ec5efef87e889f733bddb07257bf12750a68b730e42f58eb76d3c41e18a9ed57

    SHA512

    be55a86eb79f2e8300f775dac44bbb8c117fe43a126ab597ae13a1b5822b44c90f9b47d9cf100e71338385d65ef096f232d0bad2c481e1d2926dceb4b3599f33

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    288B

    MD5

    44ea936129595d0e7eb16d78a390e9fb

    SHA1

    f1ed0ba953b555b4a8f83eebcb721ba71e01a7fb

    SHA256

    f854769593e914d5771cb7c8929b4488d4016b964cfb7bc99112b5a2b91336d5

    SHA512

    8dc6545c7d0402054dc4429ffde836b53c2280444a4714368a4d9a154e395ce74d52a621e2ff5f6fed5ab3cf66fc58d790404808c798c401f5d31bae3fed8bdf

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/3404-85-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3404-5-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3404-48-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3404-38-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3404-14-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3404-24-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3404-291-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3404-19-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3404-246-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3404-132-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3404-36-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3404-31-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3404-43-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3404-26-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3404-186-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4916-185-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/4916-0-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/4916-245-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/4916-130-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/4916-290-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/4916-83-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/4916-13-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB