Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2024 06:57
Behavioral task
behavioral1
Sample
bdf74ba72e2e0aab2e7a1145005f6b7c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bdf74ba72e2e0aab2e7a1145005f6b7c.exe
Resource
win10v2004-20240226-en
General
-
Target
bdf74ba72e2e0aab2e7a1145005f6b7c.exe
-
Size
6KB
-
MD5
bdf74ba72e2e0aab2e7a1145005f6b7c
-
SHA1
eae0e16603f18d320896349e68e2580586127ffb
-
SHA256
4994c0047de1f062a9db2cb5ab1daa0568264efd448bc1123a58fa1fec040ad4
-
SHA512
faba278ec931764ae76ac47c6445c199ff2783a62041f7eb093d350b058ce81bf95c72b34cbb34b2de16538ea86cd251e8becd3f38120817a22d3c186d8f91e0
-
SSDEEP
96:DL3UCfY3J8h/uPo5y1uPienNf7dbVAw4ZP0D96XP1ki:vECw3J8hRg2ienpNVZ8P0D96PSi
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3964 MizZabbat32.exe 1400 MizZabbat32.exe -
resource yara_rule behavioral2/memory/3096-0-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x0007000000023209-6.dat upx behavioral2/memory/3096-10-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1400-12-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1400-15-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3964-16-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\MizZabbat32.exe bdf74ba72e2e0aab2e7a1145005f6b7c.exe File opened for modification C:\Windows\SysWOW64\MizZabbat32.exe bdf74ba72e2e0aab2e7a1145005f6b7c.exe File created C:\Windows\SysWOW64\MizZabbat32.exe MizZabbat32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3096 bdf74ba72e2e0aab2e7a1145005f6b7c.exe 3964 MizZabbat32.exe 1400 MizZabbat32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3096 wrote to memory of 3964 3096 bdf74ba72e2e0aab2e7a1145005f6b7c.exe 97 PID 3096 wrote to memory of 3964 3096 bdf74ba72e2e0aab2e7a1145005f6b7c.exe 97 PID 3096 wrote to memory of 3964 3096 bdf74ba72e2e0aab2e7a1145005f6b7c.exe 97 PID 3964 wrote to memory of 1400 3964 MizZabbat32.exe 100 PID 3964 wrote to memory of 1400 3964 MizZabbat32.exe 100 PID 3964 wrote to memory of 1400 3964 MizZabbat32.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdf74ba72e2e0aab2e7a1145005f6b7c.exe"C:\Users\Admin\AppData\Local\Temp\bdf74ba72e2e0aab2e7a1145005f6b7c.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\MizZabbat32.exeC:\Windows\System32\MizZabbat32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\MizZabbat32.exeC:\Windows\System32\MizZabbat32.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1400
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5bdf74ba72e2e0aab2e7a1145005f6b7c
SHA1eae0e16603f18d320896349e68e2580586127ffb
SHA2564994c0047de1f062a9db2cb5ab1daa0568264efd448bc1123a58fa1fec040ad4
SHA512faba278ec931764ae76ac47c6445c199ff2783a62041f7eb093d350b058ce81bf95c72b34cbb34b2de16538ea86cd251e8becd3f38120817a22d3c186d8f91e0