Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 06:05
Static task
static1
Behavioral task
behavioral1
Sample
d562b9ca234f6f1225dd1d6c78a50471.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d562b9ca234f6f1225dd1d6c78a50471.exe
Resource
win10v2004-20240226-en
General
-
Target
d562b9ca234f6f1225dd1d6c78a50471.exe
-
Size
226KB
-
MD5
d562b9ca234f6f1225dd1d6c78a50471
-
SHA1
309fbdeb374f3d096ae42780af05d427f1058d3a
-
SHA256
ec2a08366a16d2b7b1e782c47ca22dc78e2c63151413c8536c43c6e8748215a8
-
SHA512
8f4350aa50cf8d937819a45f17e680b7de4564c578a6701dffbb33bbbe393dd8b560f91bd135475397b28c0d597b6035292dc78da1ae2a3667a1cec350e85864
-
SSDEEP
6144:/+tTAqgYhO9MegccZ7nt44e42kps1VqPjwrhwlp1B:/ZohO9MJdnt3e/rqsrWB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2612 Lzitia.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job d562b9ca234f6f1225dd1d6c78a50471.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job d562b9ca234f6f1225dd1d6c78a50471.exe File created C:\Windows\Lzitia.exe d562b9ca234f6f1225dd1d6c78a50471.exe File opened for modification C:\Windows\Lzitia.exe d562b9ca234f6f1225dd1d6c78a50471.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Lzitia.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Lzitia.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier d562b9ca234f6f1225dd1d6c78a50471.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier Lzitia.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main Lzitia.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe 2612 Lzitia.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2612 2120 d562b9ca234f6f1225dd1d6c78a50471.exe 28 PID 2120 wrote to memory of 2612 2120 d562b9ca234f6f1225dd1d6c78a50471.exe 28 PID 2120 wrote to memory of 2612 2120 d562b9ca234f6f1225dd1d6c78a50471.exe 28 PID 2120 wrote to memory of 2612 2120 d562b9ca234f6f1225dd1d6c78a50471.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d562b9ca234f6f1225dd1d6c78a50471.exe"C:\Users\Admin\AppData\Local\Temp\d562b9ca234f6f1225dd1d6c78a50471.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\Lzitia.exeC:\Windows\Lzitia.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226KB
MD5d562b9ca234f6f1225dd1d6c78a50471
SHA1309fbdeb374f3d096ae42780af05d427f1058d3a
SHA256ec2a08366a16d2b7b1e782c47ca22dc78e2c63151413c8536c43c6e8748215a8
SHA5128f4350aa50cf8d937819a45f17e680b7de4564c578a6701dffbb33bbbe393dd8b560f91bd135475397b28c0d597b6035292dc78da1ae2a3667a1cec350e85864
-
Filesize
344B
MD59b086e4f396add9f2d1fded1b9ec9614
SHA14703b19c21bc5b28618a832957ee3b7e5a72da56
SHA256cb92173fb378dbd327bfefe6151ee91b4874e9d114cac40f29415da900eef4b4
SHA51258da1b2cc8e7bb8cf28ad42763c9b7bb9a095d9c97ab424465612f8b354f70383ccf78978e5d9973d08545e336d8e94338fb2679dd7615223e6db3726d628318