Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-01-2024 08:30

General

  • Target

    76e09018a833b7e5b8af82b649eb3a30.exe

  • Size

    335KB

  • MD5

    76e09018a833b7e5b8af82b649eb3a30

  • SHA1

    8d0040f43006e8a4268587e44b7168f185426d64

  • SHA256

    56d5edac4d0d6570b34900251cc0106257253eb47d88a5339b0378554de4f2d7

  • SHA512

    1ff47dedd147c1929653d2b051d2c73a7787ffc7b6b88c36fbb030658b3829a7a14a7156441eaf4ebb172ea5a6d4905b04a510e7161b4b4d0a6b091fcf714d79

  • SSDEEP

    6144:j6RLqSY6oAlR1OqkhT4NTdseAeFfVxjvZwTfD9gTG9HO5pKpAhNrl:j6RL8gP1OFhsjs+Ff3jvGThgTaHO5B/h

Score
9/10

Malware Config

Signatures

  • ReZer0 packer 1 IoCs

    Detects ReZer0, a packer with multiple versions used in various campaigns.

  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\76e09018a833b7e5b8af82b649eb3a30.exe
    "C:\Users\Admin\AppData\Local\Temp\76e09018a833b7e5b8af82b649eb3a30.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KCxDCJBgK" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4644.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2764
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "{path}"
      2⤵
        PID:2812
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "{path}"
        2⤵
          PID:1332
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
          "{path}"
          2⤵
            PID:2732
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
            "{path}"
            2⤵
              PID:2912
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
              "{path}"
              2⤵
                PID:2740

            Network

            MITRE ATT&CK Matrix ATT&CK v13

            Execution

            Scripting

            1
            T1064

            Scheduled Task/Job

            1
            T1053

            Persistence

            Scheduled Task/Job

            1
            T1053

            Privilege Escalation

            Scheduled Task/Job

            1
            T1053

            Defense Evasion

            Scripting

            1
            T1064

            Discovery

            System Information Discovery

            1
            T1082

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\tmp4644.tmp
              Filesize

              1KB

              MD5

              38762355d0f1d3336010379c13bb7041

              SHA1

              029c9305398375d8b1dad779a2559d62f7b507be

              SHA256

              03e1c8c7eec463ad526479716b7c8ab038db1888cd471ee595956d6675163a08

              SHA512

              9cf02e0b2d68ad5ee97e249a0c2061bcaf4e1db8402a64754c08e78f7fcba614dce4ede373f44f1002a7132cea9a97b7dc2481ace4e0935b04cabdb25368cd50

            • memory/1708-0-0x0000000000290000-0x00000000002EA000-memory.dmp
              Filesize

              360KB

            • memory/1708-1-0x00000000748F0000-0x0000000074FDE000-memory.dmp
              Filesize

              6.9MB

            • memory/1708-2-0x0000000004C40000-0x0000000004C80000-memory.dmp
              Filesize

              256KB

            • memory/1708-3-0x00000000005E0000-0x00000000005E8000-memory.dmp
              Filesize

              32KB

            • memory/1708-4-0x00000000042A0000-0x00000000042CC000-memory.dmp
              Filesize

              176KB

            • memory/1708-10-0x00000000748F0000-0x0000000074FDE000-memory.dmp
              Filesize

              6.9MB