Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 14:38
Behavioral task
behavioral1
Sample
Zzee.php.gui.3.1.0.serial.maker.by.cat.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Zzee.php.gui.3.1.0.serial.maker.by.cat.exe
Resource
win10v2004-20240226-en
General
-
Target
Zzee.php.gui.3.1.0.serial.maker.by.cat.exe
-
Size
354KB
-
MD5
4ef112c0207c23ee0edb78a05c82cadb
-
SHA1
6362a18b7e73f3f4c587c39cff041da251610a79
-
SHA256
903259f7971b4606942da5c51e20a83119acc1277e4960cc1d1b0b556fd18f5e
-
SHA512
83ec5adbce2feda3f830a1033204fed9b7da73b38c48191b9bf8b491f2dbc24ee2d2e2d947e4da18a07bba889a771e3ac1f50fe3f12044e0ba5216627c9ee7ca
-
SSDEEP
6144:IWlO87PzenJAxyXml7pbzZtVvOheZm9UuVxq1kp9YvEy9UHtf7ByphYFgHp:IWl2axyXml7lxvPmUuKvMHd7Ms
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0008000000023261-10.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 4580 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2356-0-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2356-1-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/files/0x0008000000023261-10.dat upx behavioral2/memory/4580-12-0x0000000010000000-0x0000000010086000-memory.dmp upx behavioral2/memory/4580-15-0x0000000010000000-0x0000000010086000-memory.dmp upx behavioral2/memory/4580-20-0x0000000010000000-0x0000000010086000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSIDLL = "C:\\Windows\\SysWOW64\\rundll32.exe msionz32.dll,feilxJfm" Zzee.php.gui.3.1.0.serial.maker.by.cat.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\msionz32.dll Zzee.php.gui.3.1.0.serial.maker.by.cat.exe File opened for modification C:\Windows\SysWOW64\msionz32.dll Zzee.php.gui.3.1.0.serial.maker.by.cat.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2964 2356 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2356 Zzee.php.gui.3.1.0.serial.maker.by.cat.exe 2356 Zzee.php.gui.3.1.0.serial.maker.by.cat.exe 2356 Zzee.php.gui.3.1.0.serial.maker.by.cat.exe 2356 Zzee.php.gui.3.1.0.serial.maker.by.cat.exe 2356 Zzee.php.gui.3.1.0.serial.maker.by.cat.exe 2356 Zzee.php.gui.3.1.0.serial.maker.by.cat.exe 2356 Zzee.php.gui.3.1.0.serial.maker.by.cat.exe 2356 Zzee.php.gui.3.1.0.serial.maker.by.cat.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2356 wrote to memory of 4580 2356 Zzee.php.gui.3.1.0.serial.maker.by.cat.exe 108 PID 2356 wrote to memory of 4580 2356 Zzee.php.gui.3.1.0.serial.maker.by.cat.exe 108 PID 2356 wrote to memory of 4580 2356 Zzee.php.gui.3.1.0.serial.maker.by.cat.exe 108 PID 2356 wrote to memory of 4392 2356 Zzee.php.gui.3.1.0.serial.maker.by.cat.exe 76 PID 2356 wrote to memory of 4392 2356 Zzee.php.gui.3.1.0.serial.maker.by.cat.exe 76 PID 4580 wrote to memory of 4392 4580 rundll32.exe 76 PID 4580 wrote to memory of 4392 4580 rundll32.exe 76 PID 4580 wrote to memory of 4392 4580 rundll32.exe 76 PID 4580 wrote to memory of 4392 4580 rundll32.exe 76 PID 4580 wrote to memory of 4392 4580 rundll32.exe 76 PID 4580 wrote to memory of 4392 4580 rundll32.exe 76
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵PID:4392
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1036 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:82⤵PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\Zzee.php.gui.3.1.0.serial.maker.by.cat.exe"C:\Users\Admin\AppData\Local\Temp\Zzee.php.gui.3.1.0.serial.maker.by.cat.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe msionz32.dll,feilxJfm2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 6802⤵
- Program crash
PID:2964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2356 -ip 23561⤵PID:1252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
171KB
MD5637d7b9be6c3c00a16ea0008b0bee3ae
SHA16eaffdfc588dd4f5fe04adedbcf57a557d0d1845
SHA256407b23f74fe725216eada2ade2c3c7ba800cc86be849e4237431016e0b29e8e7
SHA5125fcd2a80674402892a5077a47f54bb5ad5d339aeab678710db0e728f45645b28472faa229f72835e2e4446f00ecacebba4d3bf138fe9cd36c5c0f57f6b0f4ae2