Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28/12/2023, 20:27

General

  • Target

    f5deb84cc74811f6d2d7ccf3add99466.exe

  • Size

    28KB

  • MD5

    f5deb84cc74811f6d2d7ccf3add99466

  • SHA1

    7ff024d32640a2c28f092802563d08af0ed00387

  • SHA256

    07ac96186efe7baef1c2fe4c19fd04337fc622827a48a5f700c6419c49de93aa

  • SHA512

    0a120be20b0a9d322a89cb06907378e41fcb1da50efb52072ecb17e48f522beb5a4a97050340ee31fdf536fc270a750f3798e3295fe55dd32ad48eca8e1b0ef7

  • SSDEEP

    384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNhFO:Dv8IRRdsxq1DjJcqfF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 26 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5deb84cc74811f6d2d7ccf3add99466.exe
    "C:\Users\Admin\AppData\Local\Temp\f5deb84cc74811f6d2d7ccf3add99466.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2772
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpFFB3.tmp

    Filesize

    28KB

    MD5

    641c70e7e44adc3bb0ba0bb2add12b33

    SHA1

    66b8120e955f8c8473d5c680db18625991bbb64d

    SHA256

    e00a1d42e3586c87e5a81636c5c210dfac96ce9451844b533bf7a9e37c6a0126

    SHA512

    deee0f72b1cf24ebc8b433f827a31aa2684fe019dae2fa3d4b4384b3aeb18e3821722584a6e23016e79e568eb686858ea87ac453d96e99fe60bf6d47e437ede9

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    1KB

    MD5

    1c72e27bb86b18f5c4f3c91c0170179a

    SHA1

    8cacb42b290420b6af765b90996ee8383714efa7

    SHA256

    28449c521ec15187ab8ee485639312a5cdd9d04925b8826b243345a73e4ba283

    SHA512

    9102c2a183d4fff374fc7ed46ed892d8fb5f7b444f8db08f69b1ec9bb3e7ed4ee1e594461eba8e64f747081f1e890da1eae66f17d4cafda47cfb13ce86c24b16

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/2700-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2700-30-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2700-17-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2700-10-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2700-23-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2700-24-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2700-81-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2700-79-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2700-32-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2700-37-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2700-42-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2700-44-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2700-70-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2700-49-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2700-54-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2700-86-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2772-21-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2772-69-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2772-48-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2772-73-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2772-25-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2772-78-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2772-16-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2772-2-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2772-85-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2772-4-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB