Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 19:36

General

  • Target

    01f04c19f0726a61dc88c43e5c3c2be1.exe

  • Size

    48KB

  • MD5

    01f04c19f0726a61dc88c43e5c3c2be1

  • SHA1

    3ab41517e47a184237fe875563f021c2593d2a7c

  • SHA256

    87e2a85782f2128ad0700dd9dd1d13c55619564aebc1ed433ce679d503f8933c

  • SHA512

    6040fd8892af0a43b3f681086cde9b33a548daeba7a527f6b9bb737df5beffa2bc3d6a6c5c51de0f99a6149689253a688208fb253e0f70059196b2847902c787

  • SSDEEP

    768:EyW1yBtObv0U/xwPp0EoooiYECG2nZF5sZVcmxG:24Bobv7aB0EooYEC3rUVcYG

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01f04c19f0726a61dc88c43e5c3c2be1.exe
    "C:\Users\Admin\AppData\Local\Temp\01f04c19f0726a61dc88c43e5c3c2be1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Local\Temp\zbhnd.exe
      "C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"
      2⤵
      • Executes dropped EXE
      PID:2312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\zbhnd.exe

    Filesize

    48KB

    MD5

    5b5ff978f4724968e0ed8d46f0c5572c

    SHA1

    9f1e7d23d9e394c9567f78fa0e365031d6ecfdd4

    SHA256

    08fd0263ed4478317454caabd0fb7074ce5689f56cc4155803fd853323d26e09

    SHA512

    305ac4748734b5dd0697836950544fa1a25a8949c53f7df7375f210c0d596c430079ed902300f42c5a50978ba8630d1040fb173cc4d48beee32856bd3a8a8d70

  • memory/2024-0-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2024-2-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2024-6-0x0000000001DA0000-0x0000000001DA9000-memory.dmp

    Filesize

    36KB

  • memory/2024-14-0x0000000001DA0000-0x0000000001DA9000-memory.dmp

    Filesize

    36KB

  • memory/2312-10-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2312-12-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB