Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 21:48
Static task
static1
Behavioral task
behavioral1
Sample
51b52b6a470305d6043a8b62d54619f3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
51b52b6a470305d6043a8b62d54619f3.exe
Resource
win10v2004-20231215-en
General
-
Target
51b52b6a470305d6043a8b62d54619f3.exe
-
Size
13KB
-
MD5
51b52b6a470305d6043a8b62d54619f3
-
SHA1
639f6b28af1ffe7ac9573bf555d9bfa468481576
-
SHA256
e0a8f0734bc0bbaf7467b8afb8a4d87f9981484632c4933df3ed233e3b7f2058
-
SHA512
7096879d7a63e9a208af868684b523d5e50a17f4aacc427fa4a1976847be8d87915c78b8a5ca577f20871a6bf8399c5dae2c7913b45119a3ccd6f4f6b1c0b538
-
SSDEEP
384:mgEqaDpr1HGbt0hhFJwIWMl4HsPBhQaUxb4QsT1w4XoFTctx:7h45mp0lSIyMphQaUxsQsT1Dtx
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\zrowbhdf.dll = "{434FA69C-5F0A-42e1-82B8-10AF2C8E53C6}" 51b52b6a470305d6043a8b62d54619f3.exe -
Deletes itself 1 IoCs
pid Process 2608 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2312 51b52b6a470305d6043a8b62d54619f3.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\zrowbhdf.tmp 51b52b6a470305d6043a8b62d54619f3.exe File opened for modification C:\Windows\SysWOW64\zrowbhdf.tmp 51b52b6a470305d6043a8b62d54619f3.exe File opened for modification C:\Windows\SysWOW64\zrowbhdf.nls 51b52b6a470305d6043a8b62d54619f3.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{434FA69C-5F0A-42e1-82B8-10AF2C8E53C6} 51b52b6a470305d6043a8b62d54619f3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{434FA69C-5F0A-42e1-82B8-10AF2C8E53C6}\InProcServer32 51b52b6a470305d6043a8b62d54619f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{434FA69C-5F0A-42e1-82B8-10AF2C8E53C6}\InProcServer32\ = "C:\\Windows\\SysWow64\\zrowbhdf.dll" 51b52b6a470305d6043a8b62d54619f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{434FA69C-5F0A-42e1-82B8-10AF2C8E53C6}\InProcServer32\ThreadingModel = "Apartment" 51b52b6a470305d6043a8b62d54619f3.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2312 51b52b6a470305d6043a8b62d54619f3.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2312 51b52b6a470305d6043a8b62d54619f3.exe 2312 51b52b6a470305d6043a8b62d54619f3.exe 2312 51b52b6a470305d6043a8b62d54619f3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2608 2312 51b52b6a470305d6043a8b62d54619f3.exe 30 PID 2312 wrote to memory of 2608 2312 51b52b6a470305d6043a8b62d54619f3.exe 30 PID 2312 wrote to memory of 2608 2312 51b52b6a470305d6043a8b62d54619f3.exe 30 PID 2312 wrote to memory of 2608 2312 51b52b6a470305d6043a8b62d54619f3.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\51b52b6a470305d6043a8b62d54619f3.exe"C:\Users\Admin\AppData\Local\Temp\51b52b6a470305d6043a8b62d54619f3.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\DBED.tmp.bat2⤵
- Deletes itself
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD5bb7d50def27526a0250fe34f81c8258e
SHA12f306e7804402e28474f8957d4b39947cf56ad5f
SHA2562b30c454374ca18bc2ce7a0e8644cba4730ff998c82fcede6c903ad68e59f7bd
SHA51226a8280f396eccd175e7009faec09f875a7ef1a8d5736de786e9cf6f57a42cf983b44302afdd5fa358337f75d87ef8d0416b768befceb334f4ef305083b72a65
-
Filesize
2.2MB
MD5918f247b17bd31bac33f5fc21f16f83b
SHA1ececfe97662c5b5dcb75623f06c8b22cec08f40c
SHA2566094746f451b19c2cbea592234dedfaab57eda2c7dcc51b99ab7f67e6ce90ede
SHA5126570b0b4aa8e9b50f72695b942e9ae7c11432a0509821c1eb8043fee92285d36656ee465b8af7d4b2fb4a8ced4da419a3ca681b8e6acb1eb728be652696ca9a2