Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
687f63c6996f41ee5219e32f6d3affd2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
687f63c6996f41ee5219e32f6d3affd2.exe
Resource
win10v2004-20231215-en
General
-
Target
687f63c6996f41ee5219e32f6d3affd2.exe
-
Size
14KB
-
MD5
687f63c6996f41ee5219e32f6d3affd2
-
SHA1
7b3e450b771ae61933f6353889f0ffe5b4e6f94e
-
SHA256
af83de566e8693a1cadef14cedabf19b57fdb9057f70fa88af8b3ad48e2da02a
-
SHA512
53332f2325f523b87178f30014e272a2d391915d3b6c33315376d5b5efbd8887face44922c80ef66bdf507f75affbdcd29b4eb51d75f3b2090b69837f23c75c1
-
SSDEEP
384:y83zOB2K+dFWuw+IX/D8QTYWIhPFZswcsi1:yGaF2FWuMX/D8QTYxlBa
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 908 687f63c6996f41ee5219e32f6d3affd2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ztsa = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ztso.exe" 687f63c6996f41ee5219e32f6d3affd2.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3992 908 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 908 687f63c6996f41ee5219e32f6d3affd2.exe 908 687f63c6996f41ee5219e32f6d3affd2.exe 908 687f63c6996f41ee5219e32f6d3affd2.exe 908 687f63c6996f41ee5219e32f6d3affd2.exe 908 687f63c6996f41ee5219e32f6d3affd2.exe 908 687f63c6996f41ee5219e32f6d3affd2.exe 908 687f63c6996f41ee5219e32f6d3affd2.exe 908 687f63c6996f41ee5219e32f6d3affd2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 908 687f63c6996f41ee5219e32f6d3affd2.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 908 wrote to memory of 3392 908 687f63c6996f41ee5219e32f6d3affd2.exe 71
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\687f63c6996f41ee5219e32f6d3affd2.exe"C:\Users\Admin\AppData\Local\Temp\687f63c6996f41ee5219e32f6d3affd2.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 908 -s 3883⤵
- Program crash
PID:3992
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 908 -ip 9081⤵PID:4436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD512a1b3511c10cb8d655e243b77c2ee0b
SHA19270388bc0ac5c884f75add0c690bfc01441ded2
SHA2569fc66f0fb7e7c13558e00b052068fe2a14a2921b58d76e4afedd610982634b02
SHA51288a8ebea78f2bd5cb24b31bf56d651edbdfd980ed8292870ace78c145daac9ae003e1e18409f952f314be1de3f60a4e7f4fdf9aa68e50ccb8e4d5619ec85b84e