Analysis
-
max time kernel
152s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 23:53
Behavioral task
behavioral1
Sample
07a54788d63636b98ab441797a0159bb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
07a54788d63636b98ab441797a0159bb.exe
Resource
win10v2004-20231215-en
General
-
Target
07a54788d63636b98ab441797a0159bb.exe
-
Size
134KB
-
MD5
07a54788d63636b98ab441797a0159bb
-
SHA1
da28390a63649e5dc1dc51eaef00719fdf518bd1
-
SHA256
e40d22cc6cb765f174d93f5790a67434fc75cde9f98ab594b034f9279885f5fa
-
SHA512
85dc39da715999abe2db741d8d715142370f2703c0a2f8ab35d4b1dea42dc2785cd018f776c8faf238ed03958c7191f259b4a40d97a4f89160a0e564773a8597
-
SSDEEP
3072:X6Y86ICOgKZBEt3t04XaWxIBUFCneGFYYBuVTCFDQ:qY86kgKs3t0PWWBCUeukCFE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2448 Zwifea.exe -
resource yara_rule behavioral1/memory/2232-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/files/0x002f000000015ca1-7.dat upx behavioral1/memory/2448-9-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\KCSCPW1HKH = "C:\\Windows\\Zwifea.exe" Zwifea.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 07a54788d63636b98ab441797a0159bb.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 07a54788d63636b98ab441797a0159bb.exe File created C:\Windows\Zwifea.exe 07a54788d63636b98ab441797a0159bb.exe File opened for modification C:\Windows\Zwifea.exe 07a54788d63636b98ab441797a0159bb.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main Zwifea.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\International Zwifea.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe 2448 Zwifea.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2448 2232 07a54788d63636b98ab441797a0159bb.exe 28 PID 2232 wrote to memory of 2448 2232 07a54788d63636b98ab441797a0159bb.exe 28 PID 2232 wrote to memory of 2448 2232 07a54788d63636b98ab441797a0159bb.exe 28 PID 2232 wrote to memory of 2448 2232 07a54788d63636b98ab441797a0159bb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\07a54788d63636b98ab441797a0159bb.exe"C:\Users\Admin\AppData\Local\Temp\07a54788d63636b98ab441797a0159bb.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\Zwifea.exeC:\Windows\Zwifea.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344B
MD53d28ffbfb880a64b89648945211fb1a1
SHA186b92f7e074ba94e9d8cebbc127e769364db106f
SHA256b73508d2475ff3554b7b907823dfa320079e355bc580e1fc21947422bd7c0dd1
SHA512bac82a485e2d987dadb2bc7691d7994d4f84f94eb47c1ea46dde1d6decc0b479f4f0e6617aed94e43c8d4c2b5e1201157b14d7b36218530b9a1ac4ac5b4bbc78
-
Filesize
134KB
MD507a54788d63636b98ab441797a0159bb
SHA1da28390a63649e5dc1dc51eaef00719fdf518bd1
SHA256e40d22cc6cb765f174d93f5790a67434fc75cde9f98ab594b034f9279885f5fa
SHA51285dc39da715999abe2db741d8d715142370f2703c0a2f8ab35d4b1dea42dc2785cd018f776c8faf238ed03958c7191f259b4a40d97a4f89160a0e564773a8597