Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
3ab06752018a821f2bbb770477c9216b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3ab06752018a821f2bbb770477c9216b.exe
Resource
win10v2004-20231215-en
General
-
Target
3ab06752018a821f2bbb770477c9216b.exe
-
Size
46KB
-
MD5
3ab06752018a821f2bbb770477c9216b
-
SHA1
736c9840aefc867803b8750835d5dd3774afaa9b
-
SHA256
214802a4bfcf38c995aa7197060d31387cb38799a2e9c0fc7c8e690458909d92
-
SHA512
7b81631caff40bf4ea55c7ed062bfb5143bcc79b9345455fff33b2f3ea1f2e3da847558209b0a5e22c07b13482eb199e230430bab67f891d0e1e7dda89375710
-
SSDEEP
768:7IyXbYkrArdW4rtrdANGWyM7lj5tiZb5SihFSIboJVRKU6s8EHRJNmm:7LU6ABnrtdWGWlJ5WSIcJ/6sjHNmm
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run pmfezwry.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\3L9IkAKInb = "C:\\ProgramData\\zoxgjibk\\pmfezwry.exe" pmfezwry.exe -
Executes dropped EXE 1 IoCs
pid Process 1276 pmfezwry.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3496 3ab06752018a821f2bbb770477c9216b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3496 wrote to memory of 1276 3496 3ab06752018a821f2bbb770477c9216b.exe 104 PID 3496 wrote to memory of 1276 3496 3ab06752018a821f2bbb770477c9216b.exe 104 PID 3496 wrote to memory of 1276 3496 3ab06752018a821f2bbb770477c9216b.exe 104 PID 3496 wrote to memory of 840 3496 3ab06752018a821f2bbb770477c9216b.exe 105 PID 3496 wrote to memory of 840 3496 3ab06752018a821f2bbb770477c9216b.exe 105 PID 3496 wrote to memory of 840 3496 3ab06752018a821f2bbb770477c9216b.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ab06752018a821f2bbb770477c9216b.exe"C:\Users\Admin\AppData\Local\Temp\3ab06752018a821f2bbb770477c9216b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\ProgramData\zoxgjibk\pmfezwry.exeC:\ProgramData\zoxgjibk\pmfezwry.exe2⤵
- Adds policy Run key to start application
- Executes dropped EXE
PID:1276
-
-
C:\Windows\SysWOW64\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\3AB067~1.EXE.bak >> NUL2⤵PID:840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD53ab06752018a821f2bbb770477c9216b
SHA1736c9840aefc867803b8750835d5dd3774afaa9b
SHA256214802a4bfcf38c995aa7197060d31387cb38799a2e9c0fc7c8e690458909d92
SHA5127b81631caff40bf4ea55c7ed062bfb5143bcc79b9345455fff33b2f3ea1f2e3da847558209b0a5e22c07b13482eb199e230430bab67f891d0e1e7dda89375710