Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 19:36
Static task
static1
Behavioral task
behavioral1
Sample
01f04c19f0726a61dc88c43e5c3c2be1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01f04c19f0726a61dc88c43e5c3c2be1.exe
Resource
win10v2004-20231215-en
General
-
Target
01f04c19f0726a61dc88c43e5c3c2be1.exe
-
Size
48KB
-
MD5
01f04c19f0726a61dc88c43e5c3c2be1
-
SHA1
3ab41517e47a184237fe875563f021c2593d2a7c
-
SHA256
87e2a85782f2128ad0700dd9dd1d13c55619564aebc1ed433ce679d503f8933c
-
SHA512
6040fd8892af0a43b3f681086cde9b33a548daeba7a527f6b9bb737df5beffa2bc3d6a6c5c51de0f99a6149689253a688208fb253e0f70059196b2847902c787
-
SSDEEP
768:EyW1yBtObv0U/xwPp0EoooiYECG2nZF5sZVcmxG:24Bobv7aB0EooYEC3rUVcYG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2312 zbhnd.exe -
Loads dropped DLL 1 IoCs
pid Process 2024 01f04c19f0726a61dc88c43e5c3c2be1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2312 2024 01f04c19f0726a61dc88c43e5c3c2be1.exe 28 PID 2024 wrote to memory of 2312 2024 01f04c19f0726a61dc88c43e5c3c2be1.exe 28 PID 2024 wrote to memory of 2312 2024 01f04c19f0726a61dc88c43e5c3c2be1.exe 28 PID 2024 wrote to memory of 2312 2024 01f04c19f0726a61dc88c43e5c3c2be1.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\01f04c19f0726a61dc88c43e5c3c2be1.exe"C:\Users\Admin\AppData\Local\Temp\01f04c19f0726a61dc88c43e5c3c2be1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"2⤵
- Executes dropped EXE
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD55b5ff978f4724968e0ed8d46f0c5572c
SHA19f1e7d23d9e394c9567f78fa0e365031d6ecfdd4
SHA25608fd0263ed4478317454caabd0fb7074ce5689f56cc4155803fd853323d26e09
SHA512305ac4748734b5dd0697836950544fa1a25a8949c53f7df7375f210c0d596c430079ed902300f42c5a50978ba8630d1040fb173cc4d48beee32856bd3a8a8d70