Analysis
-
max time kernel
145s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 09:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1572300668016eb3fb8cbdc155f8323b.exe
Resource
win7-20231215-en
windows7-x64
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
1572300668016eb3fb8cbdc155f8323b.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
1572300668016eb3fb8cbdc155f8323b.exe
-
Size
212KB
-
MD5
1572300668016eb3fb8cbdc155f8323b
-
SHA1
91964cee74cb750e2c73dc2f6139969abdeffcea
-
SHA256
f8c015644a814d0dc5d3944a794dba53dff070e5c462bbd76e85e077946746b9
-
SHA512
342aea4bee0ef7f54fa9618427d4068cc9fbf4ae783b1edbdd93f27f92899cc5d8c63bc9475deb226f62921ce68e973b84ff7858b2b212e4ca8fa27234a12d5c
-
SSDEEP
3072:9Xl0akpKA579WvVgrSWP4MI06ThsOoZ+/ssynFPdsr4GIgR47fszNvxodW:9Xl0RImRWbSZmTh/oZMssSOI57fENv2
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2792 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2696 zemaruv.exe -
Loads dropped DLL 4 IoCs
pid Process 2792 cmd.exe 2792 cmd.exe 2696 zemaruv.exe 2696 zemaruv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 1728 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3032 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2696 zemaruv.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1728 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2696 zemaruv.exe 2696 zemaruv.exe 2696 zemaruv.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2696 zemaruv.exe 2696 zemaruv.exe 2696 zemaruv.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2792 2056 1572300668016eb3fb8cbdc155f8323b.exe 17 PID 2056 wrote to memory of 2792 2056 1572300668016eb3fb8cbdc155f8323b.exe 17 PID 2056 wrote to memory of 2792 2056 1572300668016eb3fb8cbdc155f8323b.exe 17 PID 2056 wrote to memory of 2792 2056 1572300668016eb3fb8cbdc155f8323b.exe 17 PID 2792 wrote to memory of 1728 2792 cmd.exe 18 PID 2792 wrote to memory of 1728 2792 cmd.exe 18 PID 2792 wrote to memory of 1728 2792 cmd.exe 18 PID 2792 wrote to memory of 1728 2792 cmd.exe 18 PID 2792 wrote to memory of 3032 2792 cmd.exe 21 PID 2792 wrote to memory of 3032 2792 cmd.exe 21 PID 2792 wrote to memory of 3032 2792 cmd.exe 21 PID 2792 wrote to memory of 3032 2792 cmd.exe 21 PID 2792 wrote to memory of 2696 2792 cmd.exe 33 PID 2792 wrote to memory of 2696 2792 cmd.exe 33 PID 2792 wrote to memory of 2696 2792 cmd.exe 33 PID 2792 wrote to memory of 2696 2792 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\1572300668016eb3fb8cbdc155f8323b.exe"C:\Users\Admin\AppData\Local\Temp\1572300668016eb3fb8cbdc155f8323b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 2056 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1572300668016eb3fb8cbdc155f8323b.exe" & start C:\Users\Admin\AppData\Local\zemaruv.exe -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 20563⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:3032
-
-
C:\Users\Admin\AppData\Local\zemaruv.exeC:\Users\Admin\AppData\Local\zemaruv.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2696
-
-