Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19/03/2024, 06:05

General

  • Target

    d562b9ca234f6f1225dd1d6c78a50471.exe

  • Size

    226KB

  • MD5

    d562b9ca234f6f1225dd1d6c78a50471

  • SHA1

    309fbdeb374f3d096ae42780af05d427f1058d3a

  • SHA256

    ec2a08366a16d2b7b1e782c47ca22dc78e2c63151413c8536c43c6e8748215a8

  • SHA512

    8f4350aa50cf8d937819a45f17e680b7de4564c578a6701dffbb33bbbe393dd8b560f91bd135475397b28c0d597b6035292dc78da1ae2a3667a1cec350e85864

  • SSDEEP

    6144:/+tTAqgYhO9MegccZ7nt44e42kps1VqPjwrhwlp1B:/ZohO9MJdnt3e/rqsrWB

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d562b9ca234f6f1225dd1d6c78a50471.exe
    "C:\Users\Admin\AppData\Local\Temp\d562b9ca234f6f1225dd1d6c78a50471.exe"
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Windows\Lzitia.exe
      C:\Windows\Lzitia.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      PID:2612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Lzitia.exe

    Filesize

    226KB

    MD5

    d562b9ca234f6f1225dd1d6c78a50471

    SHA1

    309fbdeb374f3d096ae42780af05d427f1058d3a

    SHA256

    ec2a08366a16d2b7b1e782c47ca22dc78e2c63151413c8536c43c6e8748215a8

    SHA512

    8f4350aa50cf8d937819a45f17e680b7de4564c578a6701dffbb33bbbe393dd8b560f91bd135475397b28c0d597b6035292dc78da1ae2a3667a1cec350e85864

  • C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job

    Filesize

    344B

    MD5

    9b086e4f396add9f2d1fded1b9ec9614

    SHA1

    4703b19c21bc5b28618a832957ee3b7e5a72da56

    SHA256

    cb92173fb378dbd327bfefe6151ee91b4874e9d114cac40f29415da900eef4b4

    SHA512

    58da1b2cc8e7bb8cf28ad42763c9b7bb9a095d9c97ab424465612f8b354f70383ccf78978e5d9973d08545e336d8e94338fb2679dd7615223e6db3726d628318

  • memory/2120-1-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/2120-0-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2120-2-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2120-9-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2120-17008-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2612-10-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2612-11361-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2612-25976-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2612-25977-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB