Analysis
-
max time kernel
154s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2024 12:30
Behavioral task
behavioral1
Sample
723eee3973a2f3bc6a1251fb187b3420.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
723eee3973a2f3bc6a1251fb187b3420.exe
Resource
win10v2004-20231215-en
General
-
Target
723eee3973a2f3bc6a1251fb187b3420.exe
-
Size
14KB
-
MD5
723eee3973a2f3bc6a1251fb187b3420
-
SHA1
e7f8b72e1b091ca2d93c3778810f1f9794f62b1d
-
SHA256
a7b910428519f22a5c701b936b7e81b3c3ec2e52f8ccb90a650a41e9c902e315
-
SHA512
1cb01ba0dce70bcce17669976580a3dda232d7d19d7aed18a7c8f79003aa705ecaea0fd5e3ce26b8ff50cac7585fa9ea2995ec23443d4a4aefe8ea42e8446c93
-
SSDEEP
384:VvI2g4LSz8mtS9ooqPmOpDa3qcEbIfKPHaiO+TelB2:VvI2s4KS6oqPnpDa3iAKzO+TwB
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 4832 zongximk.exe -
resource yara_rule behavioral2/memory/948-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/files/0x0002000000022775-4.dat upx behavioral2/memory/948-6-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4832-8-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\zongxim.dll 723eee3973a2f3bc6a1251fb187b3420.exe File created C:\Windows\SysWOW64\zongximk.exe 723eee3973a2f3bc6a1251fb187b3420.exe File opened for modification C:\Windows\SysWOW64\zongximk.exe 723eee3973a2f3bc6a1251fb187b3420.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 948 wrote to memory of 4832 948 723eee3973a2f3bc6a1251fb187b3420.exe 88 PID 948 wrote to memory of 4832 948 723eee3973a2f3bc6a1251fb187b3420.exe 88 PID 948 wrote to memory of 4832 948 723eee3973a2f3bc6a1251fb187b3420.exe 88 PID 948 wrote to memory of 1652 948 723eee3973a2f3bc6a1251fb187b3420.exe 96 PID 948 wrote to memory of 1652 948 723eee3973a2f3bc6a1251fb187b3420.exe 96 PID 948 wrote to memory of 1652 948 723eee3973a2f3bc6a1251fb187b3420.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\723eee3973a2f3bc6a1251fb187b3420.exe"C:\Users\Admin\AppData\Local\Temp\723eee3973a2f3bc6a1251fb187b3420.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\zongximk.exeC:\Windows\system32\zongximk.exe ˜‰2⤵
- Executes dropped EXE
PID:4832
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\723eee3973a2f3bc6a1251fb187b3420.exe.bat2⤵PID:1652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD553b46c15b8824cd09e6ac0276eb797a9
SHA183a7bde2bc40fd89070f35bda7b00f86ec08de45
SHA256f66392aa6dff214416b9cbf0697cb5c775c9ea63f29e5c62ee1dc0f4a7674250
SHA5128b6950f8954529ab91f01f7d6cef84d4130bf14589eecdca9951e344e0404c942305e2326aecfd16a0ad49ed2fed0a1a46fde6ff6e677dcb4e41fba7d6d9a47b
-
Filesize
14KB
MD5723eee3973a2f3bc6a1251fb187b3420
SHA1e7f8b72e1b091ca2d93c3778810f1f9794f62b1d
SHA256a7b910428519f22a5c701b936b7e81b3c3ec2e52f8ccb90a650a41e9c902e315
SHA5121cb01ba0dce70bcce17669976580a3dda232d7d19d7aed18a7c8f79003aa705ecaea0fd5e3ce26b8ff50cac7585fa9ea2995ec23443d4a4aefe8ea42e8446c93