Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 08:15
Static task
static1
Behavioral task
behavioral1
Sample
b6f3ae8179d78e791fd5115e3b90ba15.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b6f3ae8179d78e791fd5115e3b90ba15.exe
Resource
win10v2004-20240226-en
General
-
Target
b6f3ae8179d78e791fd5115e3b90ba15.exe
-
Size
38KB
-
MD5
b6f3ae8179d78e791fd5115e3b90ba15
-
SHA1
c7c8d6122833563d438944e1fa197354fa198017
-
SHA256
ef4a378765ee8ed2f62aa45c98e1324b9a2d71a2a7de99449f9ae655e096423d
-
SHA512
fc12c20f5d9cb1bed47e8ef21350f1ea815d2f55d82437da2ee20d13cbe338ffe634cc45b374a23b95b3fbd3aa32a1a743ffa36d1c43b675c4518a42c5cf5c59
-
SSDEEP
768:rZ3Y/CtTN0HKAliTr43hXn+vpZiCi5yOth+zT81/tjW4Dro0Awliw6ouW:rGCtjAliTr4NnRz3S4DrpAwliouW
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\Beep.sys b6f3ae8179d78e791fd5115e3b90ba15.exe File opened for modification C:\Windows\SysWOW64\drivers\Beep.sys b6f3ae8179d78e791fd5115e3b90ba15.exe -
Executes dropped EXE 1 IoCs
pid Process 2528 SiZhu.exe -
Loads dropped DLL 2 IoCs
pid Process 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: b6f3ae8179d78e791fd5115e3b90ba15.exe File opened (read-only) \??\H: b6f3ae8179d78e791fd5115e3b90ba15.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\SiZhu.exe SiZhu.exe File opened for modification C:\Windows\SysWOW64\SiZhu.exe b6f3ae8179d78e791fd5115e3b90ba15.exe File created C:\Windows\SysWOW64\SiZhu.exe b6f3ae8179d78e791fd5115e3b90ba15.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 b6f3ae8179d78e791fd5115e3b90ba15.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 04000000010000001000000079e4a9840d7d3a96d7c04fe2434c892e0f0000000100000014000000b34ddd372ed92e8f2abfbb9e20a9d31f204f194b090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000003de503556d14cbb66f0a3e21b1bc397b23dd1550b00000001000000120000004400690067006900430065007200740000001d000000010000001000000059779e39e21a2e3dfced6857ed5c5fd9030000000100000014000000a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c54361900000001000000100000000f3a0527d242de2dc98e5cfcb1e991ee2000000001000000b3030000308203af30820297a0030201020210083be056904246b1a1756ac95991c74a300d06092a864886f70d01010505003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100e23be11172dea8a4d3a357aa50a28f0b7790c9a2a5ee12ce965b010920cc0193a74e30b753f743c46900579de28d22dd870640008109cece1b83bfdfcd3b7146e2d666c705b37627168f7b9e1e957deeb748a308dad6af7a0c3906657f4a5d1fbc17f8abbeee28d7747f7a78995985686e5c23324bbf4ec0e85a6de370bf7710bffc01f685d9a844105832a97518d5d1a2be47e2276af49a33f84908608bd45fb43a84bfa1aa4a4c7d3ecf4f5f6c765ea04b37919edc22e66dce141a8e6acbfecdb3146417c75b299e32bff2eefad30b42d4abb74132da0cd4eff881d5bb8d583fb51be84928a270da3104ddf7b216f24c0a4e07a8ed4a3d5eb57fa390c3af270203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041403de503556d14cbb66f0a3e21b1bc397b23dd155301f0603551d2304183016801403de503556d14cbb66f0a3e21b1bc397b23dd155300d06092a864886f70d01010505000382010100cb9c37aa4813120afadd449c4f52b0f4dfae04f5797908a32418fc4b2b84c02db9d5c7fef4c11f58cbb86d9c7a74e79829ab11b5e370a0a1cd4c8899938c9170e2ab0f1cbe93a9ff63d5e40760d3a3bf9d5b09f1d58ee353f48e63fa3fa7dbb466df6266d6d16e418df22db5ea774a9f9d58e22b59c04023ed2d2882453e7954922698e08048a837eff0d6796016deace80ecd6eac4417382f49dae1453e2ab93653cf3a5006f72ee8c457496c612118d504ad783c2c3a806ba7ebaf1514e9d889c1b9386ce2916c8aff64b977255730c01b24a3e1dce9df477cb5b424080530ec2dbd0bbf45bf50b9a9f3eb980112adc888c698345f8d0a3cc6e9d595956dde b6f3ae8179d78e791fd5115e3b90ba15.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 484 Process not Found 484 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe Token: SeDebugPrivilege 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2528 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 29 PID 2452 wrote to memory of 2528 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 29 PID 2452 wrote to memory of 2528 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 29 PID 2452 wrote to memory of 2528 2452 b6f3ae8179d78e791fd5115e3b90ba15.exe 29 PID 2528 wrote to memory of 2480 2528 SiZhu.exe 30 PID 2528 wrote to memory of 2480 2528 SiZhu.exe 30 PID 2528 wrote to memory of 2480 2528 SiZhu.exe 30 PID 2528 wrote to memory of 2480 2528 SiZhu.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6f3ae8179d78e791fd5115e3b90ba15.exe"C:\Users\Admin\AppData\Local\Temp\b6f3ae8179d78e791fd5115e3b90ba15.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\SiZhu.exeC:\Windows\system32\SiZhu.exe SiZhu2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~SiGou.bat3⤵PID:2480
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130B
MD505f52e759c787bfbf843ba36ccf734a2
SHA12d81a279dd24a320a62d184fec747ca5f70570ee
SHA2564c9b671f2169b55c0265974d2d618e9e03060a0664da88c05ea580be9eb2a7a9
SHA512efcbce3fbcb8a0e22d4b41bfcf7afe73e5dd1bf4ceded4892fdd060e993dcf7c3930c989b6eb4fe1b690ced1f70a0e9ef75dfe6b5e2a61f9be14ef9169c6d172
-
Filesize
38KB
MD5b6f3ae8179d78e791fd5115e3b90ba15
SHA1c7c8d6122833563d438944e1fa197354fa198017
SHA256ef4a378765ee8ed2f62aa45c98e1324b9a2d71a2a7de99449f9ae655e096423d
SHA512fc12c20f5d9cb1bed47e8ef21350f1ea815d2f55d82437da2ee20d13cbe338ffe634cc45b374a23b95b3fbd3aa32a1a743ffa36d1c43b675c4518a42c5cf5c59