Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 19:40
Behavioral task
behavioral1
Sample
516ec40d651716d122d8bc42da1bc604.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
516ec40d651716d122d8bc42da1bc604.exe
Resource
win10v2004-20231222-en
General
-
Target
516ec40d651716d122d8bc42da1bc604.exe
-
Size
86KB
-
MD5
516ec40d651716d122d8bc42da1bc604
-
SHA1
59e7111af26a4587da0f78e503728b67491a37a1
-
SHA256
df739436395583f15639789b85e4a564a9fec4eb6aa5522288f784d80ad17caf
-
SHA512
0e6cc8f2e6917bf5e7cb0dc2012ddec22335ea0c87fdce87d79c914d7784058e0ace3863128b76fa7e7ed9042378def4afb1407ebdca87eb1f3d5e9bb89050e1
-
SSDEEP
1536:luMyiWMPfQSiy6kWLVvBOQ+ptrblnouy8:USW+fQSIkQVv8QGJ9out
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3776 SiZhu.exe -
resource yara_rule behavioral2/memory/444-0-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/files/0x00020000000228c7-3.dat upx behavioral2/memory/3776-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/444-14-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 516ec40d651716d122d8bc42da1bc604.exe File opened (read-only) \??\H: 516ec40d651716d122d8bc42da1bc604.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\SiZhu.exe SiZhu.exe File opened for modification C:\Windows\SysWOW64\SiZhu.exe 516ec40d651716d122d8bc42da1bc604.exe File created C:\Windows\SysWOW64\SiZhu.exe 516ec40d651716d122d8bc42da1bc604.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 444 516ec40d651716d122d8bc42da1bc604.exe 444 516ec40d651716d122d8bc42da1bc604.exe 3776 SiZhu.exe 3776 SiZhu.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 652 Process not Found 652 Process not Found -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 444 wrote to memory of 3776 444 516ec40d651716d122d8bc42da1bc604.exe 94 PID 444 wrote to memory of 3776 444 516ec40d651716d122d8bc42da1bc604.exe 94 PID 444 wrote to memory of 3776 444 516ec40d651716d122d8bc42da1bc604.exe 94 PID 3776 wrote to memory of 3416 3776 SiZhu.exe 95 PID 3776 wrote to memory of 3416 3776 SiZhu.exe 95 PID 3776 wrote to memory of 3416 3776 SiZhu.exe 95 PID 444 wrote to memory of 2416 444 516ec40d651716d122d8bc42da1bc604.exe 96 PID 444 wrote to memory of 2416 444 516ec40d651716d122d8bc42da1bc604.exe 96 PID 444 wrote to memory of 2416 444 516ec40d651716d122d8bc42da1bc604.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\516ec40d651716d122d8bc42da1bc604.exe"C:\Users\Admin\AppData\Local\Temp\516ec40d651716d122d8bc42da1bc604.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\SiZhu.exeC:\Windows\system32\SiZhu.exe SiZhu2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~SiGou.bat3⤵PID:3416
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~SiGou.bat2⤵PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130B
MD505f52e759c787bfbf843ba36ccf734a2
SHA12d81a279dd24a320a62d184fec747ca5f70570ee
SHA2564c9b671f2169b55c0265974d2d618e9e03060a0664da88c05ea580be9eb2a7a9
SHA512efcbce3fbcb8a0e22d4b41bfcf7afe73e5dd1bf4ceded4892fdd060e993dcf7c3930c989b6eb4fe1b690ced1f70a0e9ef75dfe6b5e2a61f9be14ef9169c6d172
-
Filesize
212B
MD59ef34f7b7ab3b91f528a6681d505dc81
SHA188831bf35b2f840f9eeceea10854a59fa6f49a7e
SHA256e1b8d440e72dc4bbfa8a02af2755f5027e0a4409c492a7e048ee843cb53a2aab
SHA512bd7a532ccbaeb7f742dfeb2e121de69ecd4686768891d1b5c43f2a3c09e7b5e73d0b622889882053a7a435c960fbe34889034c636b18b8c49897434b3005c9a8
-
Filesize
86KB
MD5516ec40d651716d122d8bc42da1bc604
SHA159e7111af26a4587da0f78e503728b67491a37a1
SHA256df739436395583f15639789b85e4a564a9fec4eb6aa5522288f784d80ad17caf
SHA5120e6cc8f2e6917bf5e7cb0dc2012ddec22335ea0c87fdce87d79c914d7784058e0ace3863128b76fa7e7ed9042378def4afb1407ebdca87eb1f3d5e9bb89050e1