Analysis
-
max time kernel
0s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 04:01
Behavioral task
behavioral1
Sample
0dbdbbb2e81df5f39dff184bd94464e9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0dbdbbb2e81df5f39dff184bd94464e9.exe
Resource
win10v2004-20231222-en
General
-
Target
0dbdbbb2e81df5f39dff184bd94464e9.exe
-
Size
227KB
-
MD5
0dbdbbb2e81df5f39dff184bd94464e9
-
SHA1
c6fa3f05eb9fab7df4ba10d3658275a7a8692d6c
-
SHA256
16c2715fc0c9d47274cfeaaf8a9017883c2696be4975634be18e265db6badf40
-
SHA512
705d8753d8f34c2d7affa815a217c6c44b31ea97862573623ec5f07830a1f24f0d46b2529a47705c8df341097d279f4162fa372ccbf43cc29d356b35105c1a48
-
SSDEEP
6144:aifApVMqplDf/h5O/lBC8+2hyDRlX7llrnz2P4t8oSRVYc:tfk6kDqHw2hmxlrz2HoSRr
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4768-0-0x00000000001A0000-0x000000000023E000-memory.dmp upx behavioral2/memory/1280-45-0x00000000001A0000-0x000000000023E000-memory.dmp upx behavioral2/memory/4768-166-0x00000000001A0000-0x000000000023E000-memory.dmp upx behavioral2/memory/1280-191-0x00000000001A0000-0x000000000023E000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4768 wrote to memory of 2248 4768 0dbdbbb2e81df5f39dff184bd94464e9.exe 29 PID 4768 wrote to memory of 2248 4768 0dbdbbb2e81df5f39dff184bd94464e9.exe 29 PID 4768 wrote to memory of 2248 4768 0dbdbbb2e81df5f39dff184bd94464e9.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0dbdbbb2e81df5f39dff184bd94464e9.exe"C:\Users\Admin\AppData\Local\Temp\0dbdbbb2e81df5f39dff184bd94464e9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\0DBDBB~1.EXE"C:\Users\Admin\AppData\Local\Temp\0DBDBB~1.EXE" /asService /logPath "C:\Users\Admin\AppData\Local\Temp\ZonaInstall.log"2⤵PID:1280
-
-
C:\Windows\SysWOW64\cscript.execscript //NoLogo C:\Users\Admin\AppData\Local\Temp\hd.vbs2⤵PID:2248
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD56a2149868b45b6848dbe7e88dfbc8c56
SHA12e1365ca2f938f6a444e6fd6c45b224bbb5a4850
SHA25698bf80bf1d953b9e9e42a0fe4d2ec7bec7611e86a0535f723cb2ac71cad33a34
SHA512ed9a59b33873e5bdb3128a86b7cc6fcd92c1996dd93909fa957e510b404c68d9b98a841124936cd47946d729f08250616217731d6edd23255a297566e46e2c01
-
Filesize
609B
MD58e22e8d7e48847388f95b24d0a647c2a
SHA13cbd2762309b98ad2fc378cafcc4171602089412
SHA25629aa844c01555ef568f09a478fa81cec0b0590a1aade34cc9d7752f558f613e0
SHA512a4217c6cbcf7bc7f389ee0c8b5e02da139bd2af5158ecdc2842cdcaeacb2e7f577796e779754ac4b00af0f8e92269389c6651ff277f10e81903c82d8cca19a6f