Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
20/03/2024, 02:36
Static task
static1
Behavioral task
behavioral1
Sample
d7abdf205577c961251e5ba839893da0.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d7abdf205577c961251e5ba839893da0.exe
Resource
win10v2004-20240319-en
General
-
Target
d7abdf205577c961251e5ba839893da0.exe
-
Size
13KB
-
MD5
d7abdf205577c961251e5ba839893da0
-
SHA1
5decf1ee6eadd16d0c5b1b60a45a8fa8cc103528
-
SHA256
2bce9deb36bdeddf9741bd111dcff13a0ad527b56ec8a66518fc4d5da6f1c5b7
-
SHA512
00c79f40518eb41264f02b665348fc4a29683d80c77a2178ac160bc8315557510c58cfb50e6eb472bfc034c3e81b42bf9c0f890dc90eb74342ca794d9bf773a2
-
SSDEEP
192:9ktEZ2i9iBJQTbF2qOPcLtSGDPYv85Cw7p9SvmmF1aE3jdlpZx9Wn5aAhhS9WDQ0:etEXUJPcSUl9w1HdZxA0MhS9Wc0
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\zsfsgzjp.dll = "{2CB77746-8ECC-40ca-8217-10CA8BE5EFC8}" d7abdf205577c961251e5ba839893da0.exe -
Deletes itself 1 IoCs
pid Process 2312 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2892 d7abdf205577c961251e5ba839893da0.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\zsfsgzjp.tmp d7abdf205577c961251e5ba839893da0.exe File opened for modification C:\Windows\SysWOW64\zsfsgzjp.tmp d7abdf205577c961251e5ba839893da0.exe File opened for modification C:\Windows\SysWOW64\zsfsgzjp.nls d7abdf205577c961251e5ba839893da0.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2CB77746-8ECC-40ca-8217-10CA8BE5EFC8} d7abdf205577c961251e5ba839893da0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2CB77746-8ECC-40ca-8217-10CA8BE5EFC8}\InProcServer32 d7abdf205577c961251e5ba839893da0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2CB77746-8ECC-40ca-8217-10CA8BE5EFC8}\InProcServer32\ = "C:\\Windows\\SysWow64\\zsfsgzjp.dll" d7abdf205577c961251e5ba839893da0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2CB77746-8ECC-40ca-8217-10CA8BE5EFC8}\InProcServer32\ThreadingModel = "Apartment" d7abdf205577c961251e5ba839893da0.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2892 d7abdf205577c961251e5ba839893da0.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2892 d7abdf205577c961251e5ba839893da0.exe 2892 d7abdf205577c961251e5ba839893da0.exe 2892 d7abdf205577c961251e5ba839893da0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2312 2892 d7abdf205577c961251e5ba839893da0.exe 28 PID 2892 wrote to memory of 2312 2892 d7abdf205577c961251e5ba839893da0.exe 28 PID 2892 wrote to memory of 2312 2892 d7abdf205577c961251e5ba839893da0.exe 28 PID 2892 wrote to memory of 2312 2892 d7abdf205577c961251e5ba839893da0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7abdf205577c961251e5ba839893da0.exe"C:\Users\Admin\AppData\Local\Temp\d7abdf205577c961251e5ba839893da0.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\9379.tmp.bat2⤵
- Deletes itself
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD51159dcec0497b039ef3cdd4ede179e69
SHA120081aa6e97ccf7b686b3b22843b7d4619927b39
SHA256e175aedf73cccaf6e45754513d7686f80a9ae0a9c7605c4dc8df9b9397fd3026
SHA512a66248d23f79da9d399b43e1926e0afd69fe6936f5aa9d5b7cadc10e2db3056de832763d9d0efd9d9d0a5127f1b68ae03f5ae3c7d429c04afbc10e3687ef916b
-
Filesize
428B
MD5249211d24809ab715c8ec1ceb6c97cc4
SHA1e69440b857f83f74fa9a71c132dd60e9c6e583ff
SHA2569288bbd417ccf3d63abd1724061f711128d64cc826cb865f59bfc2352a74bfe4
SHA512ce5f716b1093741f24f6364e18bc98c893500381e802c78d513309e50abd27c26edebed7bb3da6dab412d7d53ceb9aff2f809e2e28376ffa2e02747660e64d7a
-
Filesize
2.5MB
MD5202c3592af92ca4a7c8e4556fdc0839f
SHA1849e9f608ae655f7ddb88cc91963a91348e8e22d
SHA2561637105272392ea05fc452aa020928e740ca45a30b8f7c694adfdfd1f834598d
SHA5124084b80ae7e2c6f28edeffd6f6297a980b6c9551f39fecb0920a4caea4b577786954fbb7d355c1c85c94617adac405731f6669c75264a433c4536f61b947afd4