Analysis
-
max time kernel
1s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 13:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1a70e2590fb51ebf7a93de53c1b37696.exe
Resource
win7-20231215-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
1a70e2590fb51ebf7a93de53c1b37696.exe
Resource
win10v2004-20231215-en
11 signatures
150 seconds
General
-
Target
1a70e2590fb51ebf7a93de53c1b37696.exe
-
Size
678KB
-
MD5
1a70e2590fb51ebf7a93de53c1b37696
-
SHA1
97ad6860079bee3a7d46d045dfa6c1476d4ff930
-
SHA256
5f34fd718a4b541a4f78a7d976bb632b81c4a1d9773d314b2b2c582a9262c6a1
-
SHA512
51e58ead8ef5453572a053827ebe570a3b8b386fc9cff7a955f78e934c2f20b0ec818a1cbc84bea9ae8f24883b6929e1a624ac90f95803e5b7289aa6eb48c9ca
-
SSDEEP
12288:Ovu8qysq7sLw73oBUpPPZgmMlPb9enMai4/La5LFP8pnq+B0LjEoGV59zkAsCJ:OvuZfq7sLwjoBy5BM3enMaEZP8pq+q4r
Score
7/10
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000b000000014be5-4.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 3032 Zcznevrss.exe -
Loads dropped DLL 5 IoCs
pid Process 624 1a70e2590fb51ebf7a93de53c1b37696.exe 624 1a70e2590fb51ebf7a93de53c1b37696.exe 624 1a70e2590fb51ebf7a93de53c1b37696.exe 3032 Zcznevrss.exe 3032 Zcznevrss.exe -
resource yara_rule behavioral1/memory/624-6-0x0000000010000000-0x0000000010129000-memory.dmp upx behavioral1/files/0x000b000000014be5-4.dat upx behavioral1/memory/3032-32-0x0000000010000000-0x0000000010129000-memory.dmp upx behavioral1/memory/624-46-0x0000000010000000-0x0000000010129000-memory.dmp upx behavioral1/memory/3032-55-0x0000000010000000-0x0000000010129000-memory.dmp upx -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Zcznevrss.exe 1a70e2590fb51ebf7a93de53c1b37696.exe File opened for modification C:\Program Files (x86)\Zcznevrss.exe 1a70e2590fb51ebf7a93de53c1b37696.exe File created C:\Program Files (x86)\Zcznevrss.dll Zcznevrss.exe File opened for modification C:\Program Files (x86)\Zcznevrss.dll Zcznevrss.exe -
Modifies Internet Explorer Automatic Crash Recovery 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AutoRecover = "2" Zcznevrss.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\Check_Associations = "NO" Zcznevrss.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{070440B1-A83E-11EE-A80E-FA7D6BB1EAA3} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AutoRecover = "2" Zcznevrss.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 624 1a70e2590fb51ebf7a93de53c1b37696.exe 624 1a70e2590fb51ebf7a93de53c1b37696.exe 624 1a70e2590fb51ebf7a93de53c1b37696.exe 3032 Zcznevrss.exe 3032 Zcznevrss.exe 3032 Zcznevrss.exe 3032 Zcznevrss.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 624 1a70e2590fb51ebf7a93de53c1b37696.exe 624 1a70e2590fb51ebf7a93de53c1b37696.exe 3032 Zcznevrss.exe 3032 Zcznevrss.exe 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 624 wrote to memory of 3032 624 1a70e2590fb51ebf7a93de53c1b37696.exe 16 PID 624 wrote to memory of 3032 624 1a70e2590fb51ebf7a93de53c1b37696.exe 16 PID 624 wrote to memory of 3032 624 1a70e2590fb51ebf7a93de53c1b37696.exe 16 PID 624 wrote to memory of 3032 624 1a70e2590fb51ebf7a93de53c1b37696.exe 16 PID 3032 wrote to memory of 2896 3032 Zcznevrss.exe 22 PID 3032 wrote to memory of 2896 3032 Zcznevrss.exe 22 PID 3032 wrote to memory of 2896 3032 Zcznevrss.exe 22 PID 3032 wrote to memory of 2896 3032 Zcznevrss.exe 22 PID 2896 wrote to memory of 2776 2896 IEXPLORE.EXE 23 PID 2896 wrote to memory of 2776 2896 IEXPLORE.EXE 23 PID 2896 wrote to memory of 2776 2896 IEXPLORE.EXE 23 PID 2896 wrote to memory of 2776 2896 IEXPLORE.EXE 23
Processes
-
C:\Program Files (x86)\Zcznevrss.exe"C:\Program Files (x86)\Zcznevrss.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies Internet Explorer Automatic Crash Recovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2896 CREDAT:275457 /prefetch:23⤵PID:2776
-
-
-
C:\Users\Admin\AppData\Local\Temp\1a70e2590fb51ebf7a93de53c1b37696.exe"C:\Users\Admin\AppData\Local\Temp\1a70e2590fb51ebf7a93de53c1b37696.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\cmd.execmd /c ""c:\1a70e2590fb51ebf7a93de53c1b37696.exe_And xMe.bat""2⤵PID:2320
-