Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 23:18
Behavioral task
behavioral1
Sample
b8e33111e07537d2db3a514eae75118a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b8e33111e07537d2db3a514eae75118a.exe
Resource
win10v2004-20240226-en
General
-
Target
b8e33111e07537d2db3a514eae75118a.exe
-
Size
120KB
-
MD5
b8e33111e07537d2db3a514eae75118a
-
SHA1
05b6f4dea0f018a66022552d2ffa41e9fd6d3a48
-
SHA256
b40f9fc497228424efb85cf59d3099328a73bcbb4ce365e5d33016db91c29859
-
SHA512
329090b5d00417fa0fb9700bf221d711f1caed28e195cc46fba94081c6352a0e7a476774c9e1a5c18a01b397f1a7bab9f2ee05c91a4ca8dda53542e6f7a58e26
-
SSDEEP
768:h4LivE9MNXz3Wc7R1X1JenPhLMNRZREYwjfrnGOj:h4LiM94XzjneJL4RZyYwjSy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2240 ztdvl.exe -
Loads dropped DLL 1 IoCs
pid Process 2756 b8e33111e07537d2db3a514eae75118a.exe -
resource yara_rule behavioral1/memory/2756-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2756-1-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/files/0x000d00000001224c-4.dat upx behavioral1/memory/2756-6-0x0000000003150000-0x000000000316E000-memory.dmp upx behavioral1/memory/2240-9-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2240-11-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2240 2756 b8e33111e07537d2db3a514eae75118a.exe 28 PID 2756 wrote to memory of 2240 2756 b8e33111e07537d2db3a514eae75118a.exe 28 PID 2756 wrote to memory of 2240 2756 b8e33111e07537d2db3a514eae75118a.exe 28 PID 2756 wrote to memory of 2240 2756 b8e33111e07537d2db3a514eae75118a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8e33111e07537d2db3a514eae75118a.exe"C:\Users\Admin\AppData\Local\Temp\b8e33111e07537d2db3a514eae75118a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\ztdvl.exe"C:\Users\Admin\AppData\Local\Temp\ztdvl.exe"2⤵
- Executes dropped EXE
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD5df5030b9c8e360b28a0c0215c4fcf26d
SHA1c7b8dbabc319cb5ea7e0812b89696239946a9855
SHA2565cd554d4cc8bc12fa85d11081df12874cd95a4563b85fe87bfa71d0a9b84359c
SHA5126fe97925af08af5567236d088a1fee77f750b080380bcdea8ac0fd0875c9fbe8c862331b3f916b1f4068e84c6e6f55c927708006218a92a60e9f465c1336d279