Analysis

  • max time kernel
    141s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/02/2024, 15:42

General

  • Target

    dd499234ddb9fbf033eb5a22ddc40fe85191dcf5b6ef653fad371718c4ec8579.exe

  • Size

    196KB

  • MD5

    5cdba07e027071a707abd3d40cc8f935

  • SHA1

    bfd624b287f73d723e03e6aeb31c738172b29e0e

  • SHA256

    dd499234ddb9fbf033eb5a22ddc40fe85191dcf5b6ef653fad371718c4ec8579

  • SHA512

    7b3c90c2708a40b8ec06c7b46fcac059f85e28e37f9a425c00ae42a21f66d43cbd7318b47d41bba05d081339288022a6040c354ca0fa1e32cc796ef1ee4faff0

  • SSDEEP

    6144:rBs27MMLyX5HXXXDTXXXOGqIII+pXXX5AYjKXXXDoXXXG6XXXxXXXLIIIEAkOCOy:rK20HXXX/XXXFqIIIcXXX5j2XXXcXXX/

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd499234ddb9fbf033eb5a22ddc40fe85191dcf5b6ef653fad371718c4ec8579.exe
    "C:\Users\Admin\AppData\Local\Temp\dd499234ddb9fbf033eb5a22ddc40fe85191dcf5b6ef653fad371718c4ec8579.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\DD4992~1.EXE > nul
      2⤵
      • Deletes itself
      PID:3016
  • C:\Windows\Debug\zskhost.exe
    C:\Windows\Debug\zskhost.exe
    1⤵
    • Executes dropped EXE
    • Checks processor information in registry
    PID:2140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\debug\zskhost.exe

    Filesize

    196KB

    MD5

    85676ae1d6de36922066adff93c8f483

    SHA1

    e8e2b5c4fac878813f98052c3da4a6273d5ee392

    SHA256

    945f088ec7c27147c571fa37a33250ff8c95131d5816a156293392ce0ce885a3

    SHA512

    25ec462510bcb8f5801764dab16eff26ddadf6fe402c56bee61e9f8db12cc10f0831d830cdd08c3f0d2804b2f8a40898b7310445f63bcafd28ab4767040b6aeb