Analysis
-
max time kernel
12s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 23:12
Behavioral task
behavioral1
Sample
51e0fce7476092a3a0eb71136251e526.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
51e0fce7476092a3a0eb71136251e526.exe
Resource
win10v2004-20231215-en
General
-
Target
51e0fce7476092a3a0eb71136251e526.exe
-
Size
14KB
-
MD5
51e0fce7476092a3a0eb71136251e526
-
SHA1
a911bfe675df4165877001c6ffc3e270b49d0a9e
-
SHA256
817d2bc686eef06919a5e7132b7fdcbcc445a11fc3bbcdb715fc641e3a636bf3
-
SHA512
331579aaf1081e514b30dfe696867059022089cb5b2077bc6b42e97465a983a5a339a6e71fdfe150800d285faf7e756254567da717e9afe55ed1967914c566ed
-
SSDEEP
384:aVDrfhSaIrKfFloDV6n/gtkWPwauQmtxMs:atrfBsSCDa/+R4
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1744 zongximk.exe -
resource yara_rule behavioral2/memory/1568-0-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/files/0x0007000000023200-5.dat upx behavioral2/memory/1744-7-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/1568-6-0x0000000000400000-0x0000000000411000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\zongxim.dll 51e0fce7476092a3a0eb71136251e526.exe File created C:\Windows\SysWOW64\zongximk.exe 51e0fce7476092a3a0eb71136251e526.exe File opened for modification C:\Windows\SysWOW64\zongximk.exe 51e0fce7476092a3a0eb71136251e526.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1568 wrote to memory of 1744 1568 51e0fce7476092a3a0eb71136251e526.exe 27 PID 1568 wrote to memory of 1744 1568 51e0fce7476092a3a0eb71136251e526.exe 27 PID 1568 wrote to memory of 1744 1568 51e0fce7476092a3a0eb71136251e526.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\51e0fce7476092a3a0eb71136251e526.exe"C:\Users\Admin\AppData\Local\Temp\51e0fce7476092a3a0eb71136251e526.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\zongximk.exeC:\Windows\system32\zongximk.exe ˜‰2⤵
- Executes dropped EXE
PID:1744
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\51e0fce7476092a3a0eb71136251e526.exe.bat2⤵PID:660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5b7d7b38b92ebd996745bea90b0fadbfc
SHA19e2bbd9e9b6832dd609c043b923fca2da1265609
SHA256abe56a5e019232de34122c617e65d18b3be6e1ed17679a37726a44fc1e428959
SHA5127d795efecde44de25bc463b95db22914d9d3317a39315c5bf84ab0d1a3b40c401ade623dc8e142944a611bc609714d82018c66d3f25da840bd0bb9f25eb8fee4
-
Filesize
14KB
MD551e0fce7476092a3a0eb71136251e526
SHA1a911bfe675df4165877001c6ffc3e270b49d0a9e
SHA256817d2bc686eef06919a5e7132b7fdcbcc445a11fc3bbcdb715fc641e3a636bf3
SHA512331579aaf1081e514b30dfe696867059022089cb5b2077bc6b42e97465a983a5a339a6e71fdfe150800d285faf7e756254567da717e9afe55ed1967914c566ed