Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 17:45
Behavioral task
behavioral1
Sample
dfbf4a73960560845a306faa1c5c64f2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dfbf4a73960560845a306faa1c5c64f2.exe
Resource
win10v2004-20240226-en
General
-
Target
dfbf4a73960560845a306faa1c5c64f2.exe
-
Size
13KB
-
MD5
dfbf4a73960560845a306faa1c5c64f2
-
SHA1
5525dad3d649ad10f599447fe13fd25ba57a9a69
-
SHA256
a53c7212b63cdd16ce617d2ce921a361c47b4983aff71e7bfa8dcb931711ba72
-
SHA512
52e231619b19b871407ccd9fdf124dc3b473c58de0bdd49ca33d91f37f57985141cf50274fc131d2ead48c6b7dc9445988ddb82c405cd57ae47332af85628090
-
SSDEEP
384:cEyPDYCdJPvNyb89G0g4RV0d5HRbBbhtHHni:5CBnXNI8bg4P07HLP
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 2356 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2620 zongximk.exe -
Loads dropped DLL 2 IoCs
pid Process 640 dfbf4a73960560845a306faa1c5c64f2.exe 640 dfbf4a73960560845a306faa1c5c64f2.exe -
resource yara_rule behavioral1/memory/640-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x0009000000014738-3.dat upx behavioral1/memory/2620-11-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/640-12-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\zongxim.dll dfbf4a73960560845a306faa1c5c64f2.exe File created C:\Windows\SysWOW64\zongximk.exe dfbf4a73960560845a306faa1c5c64f2.exe File opened for modification C:\Windows\SysWOW64\zongximk.exe dfbf4a73960560845a306faa1c5c64f2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 640 wrote to memory of 2620 640 dfbf4a73960560845a306faa1c5c64f2.exe 28 PID 640 wrote to memory of 2620 640 dfbf4a73960560845a306faa1c5c64f2.exe 28 PID 640 wrote to memory of 2620 640 dfbf4a73960560845a306faa1c5c64f2.exe 28 PID 640 wrote to memory of 2620 640 dfbf4a73960560845a306faa1c5c64f2.exe 28 PID 640 wrote to memory of 2356 640 dfbf4a73960560845a306faa1c5c64f2.exe 31 PID 640 wrote to memory of 2356 640 dfbf4a73960560845a306faa1c5c64f2.exe 31 PID 640 wrote to memory of 2356 640 dfbf4a73960560845a306faa1c5c64f2.exe 31 PID 640 wrote to memory of 2356 640 dfbf4a73960560845a306faa1c5c64f2.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfbf4a73960560845a306faa1c5c64f2.exe"C:\Users\Admin\AppData\Local\Temp\dfbf4a73960560845a306faa1c5c64f2.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\zongximk.exeC:\Windows\system32\zongximk.exe ˜‰2⤵
- Executes dropped EXE
PID:2620
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\dfbf4a73960560845a306faa1c5c64f2.exe.bat2⤵
- Deletes itself
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5ddcfc193f9a79db4e635bd5d45f729d5
SHA14d6b5824967df9b5b5a3b4c6ffee1eec5a9e0a89
SHA2561d45790fdf90d57ce7d7002abdbbf840e5b186d8b82493e57f5aae013ffd86b0
SHA51290d695c30f9538f7e82e88b6e35d3bcf48ebeb345755dafc286a9d89653a85ad704dbfe798166eccfd8f672f664fed0ec07182828cf9501403a490860c46ee5e
-
Filesize
13KB
MD5dfbf4a73960560845a306faa1c5c64f2
SHA15525dad3d649ad10f599447fe13fd25ba57a9a69
SHA256a53c7212b63cdd16ce617d2ce921a361c47b4983aff71e7bfa8dcb931711ba72
SHA51252e231619b19b871407ccd9fdf124dc3b473c58de0bdd49ca33d91f37f57985141cf50274fc131d2ead48c6b7dc9445988ddb82c405cd57ae47332af85628090