Analysis
-
max time kernel
121s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 14:04
Static task
static1
Behavioral task
behavioral1
Sample
391666d406f725aed5f387bac1d70789.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
391666d406f725aed5f387bac1d70789.exe
Resource
win10v2004-20231215-en
General
-
Target
391666d406f725aed5f387bac1d70789.exe
-
Size
1.3MB
-
MD5
391666d406f725aed5f387bac1d70789
-
SHA1
e258a5d50ce762617235af9cfa1a081ac091f32a
-
SHA256
46178572ae7ce7ea98c093e5ea7a09af9e8d367e7bf830d131ff1413f4488815
-
SHA512
2abb3d5d1c74c5c3079bfa2830c896de4f8a7c9280996fb8613ddc3f7cc15e812673b3aa7aa8742a93c64662638672016b5e3cbf4a4d9c162e5ef30b154ef352
-
SSDEEP
24576:Yrl4YBHXOjXaJg50owib4FHF7+wPz/wH8wz/pywAMMNOB284bA52qm:Yqi+l3wibU/nwz/p94Nyusm
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1628 zerub3_391666d406f725aed5f387bac1d70789.exe 2848 zerub3_391666d406f725aed5f387bac1d70789.exe -
resource yara_rule behavioral1/memory/2848-23-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2848-21-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2848-17-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2848-27-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\nwc = "C:\\Windows\\nwc.exe" zerub3_391666d406f725aed5f387bac1d70789.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nwc = "C:\\Windows\\nwc.exe" zerub3_391666d406f725aed5f387bac1d70789.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1628 set thread context of 2848 1628 zerub3_391666d406f725aed5f387bac1d70789.exe 1 -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\zerub3_391666d406f725aed5f387bac1d70789.exe 391666d406f725aed5f387bac1d70789.exe File opened for modification C:\Windows\zerub3_391666d406f725aed5f387bac1d70789.exe 391666d406f725aed5f387bac1d70789.exe File created C:\Windows\7-zip.jpg zerub3_391666d406f725aed5f387bac1d70789.exe File created C:\Windows\test.exe zerub3_391666d406f725aed5f387bac1d70789.exe File created C:\Windows\7z464.exe zerub3_391666d406f725aed5f387bac1d70789.exe File created C:\Windows\nwc.exe zerub3_391666d406f725aed5f387bac1d70789.exe File opened for modification C:\Windows\nwc.exe zerub3_391666d406f725aed5f387bac1d70789.exe File opened for modification C:\Windows\7-zip.jpg DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2848 zerub3_391666d406f725aed5f387bac1d70789.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2808 DllHost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1628 2220 391666d406f725aed5f387bac1d70789.exe 3 PID 2220 wrote to memory of 1628 2220 391666d406f725aed5f387bac1d70789.exe 3 PID 2220 wrote to memory of 1628 2220 391666d406f725aed5f387bac1d70789.exe 3 PID 2220 wrote to memory of 1628 2220 391666d406f725aed5f387bac1d70789.exe 3 PID 1628 wrote to memory of 2848 1628 zerub3_391666d406f725aed5f387bac1d70789.exe 1 PID 1628 wrote to memory of 2848 1628 zerub3_391666d406f725aed5f387bac1d70789.exe 1 PID 1628 wrote to memory of 2848 1628 zerub3_391666d406f725aed5f387bac1d70789.exe 1 PID 1628 wrote to memory of 2848 1628 zerub3_391666d406f725aed5f387bac1d70789.exe 1 PID 1628 wrote to memory of 2848 1628 zerub3_391666d406f725aed5f387bac1d70789.exe 1 PID 1628 wrote to memory of 2848 1628 zerub3_391666d406f725aed5f387bac1d70789.exe 1
Processes
-
C:\Windows\zerub3_391666d406f725aed5f387bac1d70789.exeC:\Windows\zerub3_391666d406f725aed5f387bac1d70789.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2848
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:2808
-
C:\Windows\zerub3_391666d406f725aed5f387bac1d70789.exe"C:\Windows\zerub3_391666d406f725aed5f387bac1d70789.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1628
-
C:\Users\Admin\AppData\Local\Temp\391666d406f725aed5f387bac1d70789.exe"C:\Users\Admin\AppData\Local\Temp\391666d406f725aed5f387bac1d70789.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5ba62da181a50d32ccae62bec03d75d19
SHA1646f50b30556935bee4e312b25e613c4c15a6b26
SHA256cc7ad4c4b696a3d035bacc006f8906c39d893fefbaaf1fabd98175f465a0d5fb
SHA5125b1853d4cecf8caa524be46d3b3af136a6c8622719977020928895140edd5cceaa0a5dcbcba5daf3b44b6cec8bc127b9c604218d670fcbcf89b3048ab1ec9c52
-
Filesize
1.3MB
MD5391666d406f725aed5f387bac1d70789
SHA1e258a5d50ce762617235af9cfa1a081ac091f32a
SHA25646178572ae7ce7ea98c093e5ea7a09af9e8d367e7bf830d131ff1413f4488815
SHA5122abb3d5d1c74c5c3079bfa2830c896de4f8a7c9280996fb8613ddc3f7cc15e812673b3aa7aa8742a93c64662638672016b5e3cbf4a4d9c162e5ef30b154ef352