Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 06:53
Static task
static1
Behavioral task
behavioral1
Sample
2c54eaf5f73673f9510f1656ccd08433.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2c54eaf5f73673f9510f1656ccd08433.exe
Resource
win10v2004-20231222-en
General
-
Target
2c54eaf5f73673f9510f1656ccd08433.exe
-
Size
416KB
-
MD5
2c54eaf5f73673f9510f1656ccd08433
-
SHA1
056bf89ee280b1b3a293345a8a44bb7843903c5b
-
SHA256
dd382b9a694da32c87f6c4e7b62cce3f2e421330f1016781e443a7ddc142e7f7
-
SHA512
80fe4d48b91fd59c1dbe5a15cec64ee82c7a402cae7750ee984d3be573c1e16a36e52b005787b866c04366117481afd925a50101a32bf2b1bac41a4a8522055a
-
SSDEEP
6144:b0h3b0nyI44xP+BfJ0Moadp4oGL9wnSkgioJ553a5KV+MzLObSITnUvyklXWF:4h3bMyI44YBHnXM55j+ALO2IuLS
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2176 zerub3_2c54eaf5f73673f9510f1656ccd08433.exe 2664 zerub3_2c54eaf5f73673f9510f1656ccd08433.exe -
resource yara_rule behavioral1/memory/2664-22-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2664-24-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2664-17-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2664-27-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nwc = "C:\\Windows\\nwc.exe" zerub3_2c54eaf5f73673f9510f1656ccd08433.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\nwc = "C:\\Windows\\nwc.exe" zerub3_2c54eaf5f73673f9510f1656ccd08433.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2176 set thread context of 2664 2176 zerub3_2c54eaf5f73673f9510f1656ccd08433.exe 16 -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\test.exe zerub3_2c54eaf5f73673f9510f1656ccd08433.exe File created C:\Windows\nwc.exe zerub3_2c54eaf5f73673f9510f1656ccd08433.exe File opened for modification C:\Windows\nwc.exe zerub3_2c54eaf5f73673f9510f1656ccd08433.exe File opened for modification C:\Windows\7-zip.jpg DllHost.exe File created C:\Windows\zerub3_2c54eaf5f73673f9510f1656ccd08433.exe 2c54eaf5f73673f9510f1656ccd08433.exe File opened for modification C:\Windows\zerub3_2c54eaf5f73673f9510f1656ccd08433.exe 2c54eaf5f73673f9510f1656ccd08433.exe File created C:\Windows\7-zip.jpg zerub3_2c54eaf5f73673f9510f1656ccd08433.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2664 zerub3_2c54eaf5f73673f9510f1656ccd08433.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 DllHost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2176 2544 2c54eaf5f73673f9510f1656ccd08433.exe 18 PID 2544 wrote to memory of 2176 2544 2c54eaf5f73673f9510f1656ccd08433.exe 18 PID 2544 wrote to memory of 2176 2544 2c54eaf5f73673f9510f1656ccd08433.exe 18 PID 2544 wrote to memory of 2176 2544 2c54eaf5f73673f9510f1656ccd08433.exe 18 PID 2176 wrote to memory of 2664 2176 zerub3_2c54eaf5f73673f9510f1656ccd08433.exe 16 PID 2176 wrote to memory of 2664 2176 zerub3_2c54eaf5f73673f9510f1656ccd08433.exe 16 PID 2176 wrote to memory of 2664 2176 zerub3_2c54eaf5f73673f9510f1656ccd08433.exe 16 PID 2176 wrote to memory of 2664 2176 zerub3_2c54eaf5f73673f9510f1656ccd08433.exe 16 PID 2176 wrote to memory of 2664 2176 zerub3_2c54eaf5f73673f9510f1656ccd08433.exe 16 PID 2176 wrote to memory of 2664 2176 zerub3_2c54eaf5f73673f9510f1656ccd08433.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c54eaf5f73673f9510f1656ccd08433.exe"C:\Users\Admin\AppData\Local\Temp\2c54eaf5f73673f9510f1656ccd08433.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\zerub3_2c54eaf5f73673f9510f1656ccd08433.exe"C:\Windows\zerub3_2c54eaf5f73673f9510f1656ccd08433.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2176
-
-
C:\Windows\zerub3_2c54eaf5f73673f9510f1656ccd08433.exeC:\Windows\zerub3_2c54eaf5f73673f9510f1656ccd08433.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2664
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:2280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
389KB
MD5b64c2f346f061f79d7e1b646b0d29c36
SHA18cbf65c8cd3edfde3c637cbc595d135759847147
SHA256e66ae9f3f0a7431f23864b64a12d80119ba0b375905bd4a0c35c9b99f3aea891
SHA5127a56f3a10bcba7c6360d060f8c2075f03977adf6b1babff4399c7b38a9b41157de379d3563a0ad6c902f4c7251aad1f37fcc0cbcba5ad2aedfdca0d26f05092e
-
Filesize
382KB
MD5c0d30ec972ea3374d1303017b30a552b
SHA185cc5ae712643a57411b678020be71f811516fa0
SHA256a7355555eebdd9ec9d40fb71cebc59dea1b95d77bc066fc8e0fe86414ebaaae7
SHA512ca407252fc7eeb59a9f134d1c7cb7fcedd7023f892f699918d97d23c43b70a9289a043d6396a460500d4b23dc59ddee084f21aeceb3a82cd088bbd5b5d7dc92c
-
Filesize
93KB
MD5c3e5dcd611ac1d4df40d8d70b4de7632
SHA194831bf622bfdb2302fa06b9cffd87292834e98b
SHA2569e1be5d722069e25da2a4ff08df82cea95f40c09db7b03601141fcfe9fd42d2e
SHA5126dad01f489e03eeb7177806df9659233145afca5e69f68f78fc8f3ed7dba266cad4c782c5e881ff2c1e44719c41838c28e01cf3719820ac909cdd1e705478cd3