Analysis

  • max time kernel
    182s
  • max time network
    223s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 22:52

General

  • Target

    417374b3c984aa8972074fb39692bf8d.exe

  • Size

    104KB

  • MD5

    417374b3c984aa8972074fb39692bf8d

  • SHA1

    6a3a2a3c28687b0d9c3099ca9b308040d311080e

  • SHA256

    7e4fe0c30e8549d470865f2da2a5d176b1ef5d7db55e4c3e1c71135bf135e752

  • SHA512

    3fb7a34e5aac5e7043e7afabd703d217f7c85550b023033edc6b4483b11a923dbdf6b0b41f819fe63e2f1325b470e403815ee077d2e1357aecf27556f5d98b30

  • SSDEEP

    3072:a15T3Ncy/RpISCs2EWFrphy2G5mZ5E+HIbZoutlf:a15T9cy/RpIvuWXhy2v5abZoSlf

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\417374b3c984aa8972074fb39692bf8d.exe
    "C:\Users\Admin\AppData\Local\Temp\417374b3c984aa8972074fb39692bf8d.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Users\Admin\AppData\Local\Temp\417374b3c984aa8972074fb39692bf8d.exe
      "C:\Users\Admin\AppData\Local\Temp\417374b3c984aa8972074fb39692bf8d.exe" /asService
      2⤵
      • Drops file in Program Files directory
      PID:2636
    • C:\Windows\SysWOW64\cscript.exe
      cscript //NoLogo C:\Users\Admin\AppData\Local\Temp\hd.vbs
      2⤵
        PID:1704

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      5bff7e4341732594c5820278c7735486

      SHA1

      6ab0d97df7d699dc9ce48cbb20120f4342ff164e

      SHA256

      174c4930c1a009a0d6387c3d8303e0c51047a0d5acb8b793dc9faade9ced125e

      SHA512

      97c6cf3744bd6b2b4c9f1fe86f3548b00cd1aeb9f6760f5753354260f963621acaf5b37e5e07cde2746d711df2027942eaf319996aba46bc848a738fd84bd79e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      744077f8db236d204f30f64c19d681a8

      SHA1

      059418b98e22dcce2e8a294da14bc90565620253

      SHA256

      dc509a82b073c57138aeefe3b057b411db6546e7e9da188670fef43a333438aa

      SHA512

      322ac4bba29982e69d87879bb3109d372d91b6828838ec827f6e4f2c687e00921d90e5ec1455db4eade6bc0b668d2664a4239caa7dc4a7cf890528da6f3b668c

    • C:\Users\Admin\AppData\Local\Temp\CabCF17.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\TarCF18.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Admin\AppData\Local\Temp\ZonaInstall.log

      Filesize

      2KB

      MD5

      e1dac727c2637712172059349054e42c

      SHA1

      30906a6046a0cd9f80006f000164b3ad543a69e2

      SHA256

      3c4e81c8f50985b571e4b95e48e1241d0b8500418aea9152b6af0e7113419909

      SHA512

      8b199d5c5fdaf06302f7c7d8b2a68da267306d9c6c3501d74f150f488c7ca995d52152ea1f28f3e9556e14340ceed010beaa2728ba498cd41bb463d38f873ad2

    • C:\Users\Admin\AppData\Local\Temp\ZonaInstall.log

      Filesize

      1KB

      MD5

      f279d73e7005020b57b00024d695ba6d

      SHA1

      f2ad132e563c1476bece6b3f263e08fa16e1c4fc

      SHA256

      631f1a4c4043ef47ee70bef13625d98273fe46a0c426033bbabc3707d710dc4f

      SHA512

      3d9278f3077b5080d333eb622dab2d728f3b5c3cd2b1d2b22a23d56119abac2d02f7b06c6f542ba7ce939fb4263292da78e48396423f06f369aba8026a0eb148

    • C:\Users\Admin\AppData\Local\Temp\hd.vbs

      Filesize

      245B

      MD5

      d8682d715a652f994dca50509fd09669

      SHA1

      bb03cf242964028b5d9183812ed8b04de9d55c6e

      SHA256

      4bd3521fb2b5c48fe318a874bf64c6b1f62f5212b8c88790006cafaf31d207ba

      SHA512

      eaa39d87002df1eea16b215c9f099731253b7af72e46b12f64423874dbcdd8f68a164d7641bafb3f854aa6ad8aa7269da59ed0b32cd41eccba5d6f296f9a52ca

    • C:\Users\Admin\AppData\Roaming\Zona\init.xml

      Filesize

      243B

      MD5

      19244dc9b7aebb0e79c3fd178211ff70

      SHA1

      fd8e1b78cdf1739c07bc9feafaff7e308b7a00fe

      SHA256

      a8dad644df570e90989163b2f24da9ff5db288e0285d7c64fe3605c446549361

      SHA512

      0905d4eb880fb35a2d4d292bc9a30423a545d1117db1be8c53dfe5d4fa15b95c9063ca05c2d52b33cd57c43fc5ff6d30bd482f33c003272ba7ab9a69b75c5ff3

    • memory/2636-50-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/2636-12-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/2952-11-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/2952-39-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/2952-0-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/2952-10-0x0000000002700000-0x000000000273D000-memory.dmp

      Filesize

      244KB

    • memory/2952-9-0x0000000002700000-0x000000000273D000-memory.dmp

      Filesize

      244KB

    • memory/2952-153-0x0000000002700000-0x000000000273D000-memory.dmp

      Filesize

      244KB

    • memory/2952-154-0x0000000002700000-0x000000000273D000-memory.dmp

      Filesize

      244KB

    • memory/2952-3-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/2952-161-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/2952-221-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB