Analysis

  • max time kernel
    149s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2023 16:54

General

  • Target

    01aa020c133ddff8834e184fa2ced397.exe

  • Size

    124KB

  • MD5

    01aa020c133ddff8834e184fa2ced397

  • SHA1

    19db8f0440b414ab62561aea89ab7d18479813a9

  • SHA256

    16be09859cb808f49ad5354878b342ce20ec4bdb86517e7e2b100e89dc626ed7

  • SHA512

    f62c196d80d8f3f6c321adaea94c7fd6782585849c0977a2292648942e617b879b70abf186249aebae25a70b55107b96f0b854f890d547012ba4db087f60d259

  • SSDEEP

    1536:2eJ9pKApeU0GgAYu0P1kNmwldCMhdu8KWP/nTn8nBP9VewNeG0h/l:r9pR0U0GgA898t

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01aa020c133ddff8834e184fa2ced397.exe
    "C:\Users\Admin\AppData\Local\Temp\01aa020c133ddff8834e184fa2ced397.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Users\Admin\zulan.exe
      "C:\Users\Admin\zulan.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\zulan.exe

    Filesize

    124KB

    MD5

    d019b9e01bd452c850024b72b8e462fd

    SHA1

    88bd2517eb4b9aec278ea2684a0c4638c73dc7c9

    SHA256

    6af575b089008153f2b787f3ee6d464c8bbee36362857890aeb465639206e022

    SHA512

    9e84176f97b218991834ae6b8052906ec7c0fa5fc4587c1f24afaa58aafdc226c47c6d764e4f57d83987df6c4e72b3d0592b3113231b42c986ab5dc889a8e2cc

  • C:\Users\Admin\zulan.exe

    Filesize

    93KB

    MD5

    15f3be00fc6247f6e8ebbfd9793d894d

    SHA1

    cc39d416314ef8ced72248053a61973b3c3c5807

    SHA256

    7fa6620b920d7fdee02d91b9ebc4028cdf6f57f7110d53fb2b9dbe0570dedbbe

    SHA512

    59f626cd7544dd88e34b251d665620a209bbc8c62c5a5c81ba93a350685dae6f29c357058d5fa2c55c2f13177594c36ee44f4acbb0e3ef92c74f962aafe32480