Analysis

  • max time kernel
    9s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 06:43

General

  • Target

    2c10455bda86d931f80239fed605f0c4.exe

  • Size

    217KB

  • MD5

    2c10455bda86d931f80239fed605f0c4

  • SHA1

    991efbb5d15e945f9c2f741d606c2cd9173d5f09

  • SHA256

    cab078c2a2c5c58d880224a12924b5e5f01e3b44b2e42755a1afb9bebfe3c831

  • SHA512

    9fd4813dfeede13156bfbadff791ab37a57c16ab9f3983b1d5877af34165994614ca7d65522094995d9102ec62263fdfc6f38abecb9f8e33e36738c5d2d9c33d

  • SSDEEP

    6144:NAJzqnhxwEa0JyJnx2bLPI0ADVoACLgk:SxWoEawyJ4LALEg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c10455bda86d931f80239fed605f0c4.exe
    "C:\Users\Admin\AppData\Local\Temp\2c10455bda86d931f80239fed605f0c4.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4752
    • C:\Windows\Zbybea.exe
      C:\Windows\Zbybea.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      PID:2872

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2872-111242-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/2872-134439-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/2872-8-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/2872-135085-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/2872-22067-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/2872-135081-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/2872-135079-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/2872-82808-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/2872-53067-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/2872-135078-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/2872-66741-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/4752-1-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/4752-0-0x00000000004F0000-0x0000000000504000-memory.dmp

          Filesize

          80KB

        • memory/4752-36080-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/4752-8479-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB