Analysis
-
max time kernel
137s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 02:35
Behavioral task
behavioral1
Sample
c4e649e8f86e8c204f694a151aa5a1d1b092ee969c0b0c6b78f0c84300aefa91.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4e649e8f86e8c204f694a151aa5a1d1b092ee969c0b0c6b78f0c84300aefa91.exe
Resource
win10v2004-20240412-en
General
-
Target
c4e649e8f86e8c204f694a151aa5a1d1b092ee969c0b0c6b78f0c84300aefa91.exe
-
Size
137KB
-
MD5
6d94ef66f49dd89a25e90bcefb0d724c
-
SHA1
f0df666571f59f4b0962225f3d45f7608dd864fe
-
SHA256
c4e649e8f86e8c204f694a151aa5a1d1b092ee969c0b0c6b78f0c84300aefa91
-
SHA512
944e9ff1d67dfd4c857041b8a84d2e6925c5b3a3d932308c04e34ff45dab3f494ef19dcde758c4b7aa8487277f5e8440caa4a54c4abc5ee14a8b5cb6d4ba46f0
-
SSDEEP
3072:AE9ByF5wP7Ht99mbaa+vKAzWvSVJSwpi6Ds9N:7907wTr9mea+i6WKQ/
Malware Config
Signatures
-
Detects executables packed with ASPack 6 IoCs
Processes:
resource yara_rule behavioral2/memory/1932-0-0x0000000000400000-0x000000000045E000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/1932-1-0x0000000000400000-0x000000000045E000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/1932-2-0x0000000000400000-0x000000000045E000-memory.dmp INDICATOR_EXE_Packed_ASPack C:\PROGRA~3\Mozilla\lmzjuzl.exe INDICATOR_EXE_Packed_ASPack behavioral2/memory/712-11-0x0000000000400000-0x000000000045E000-memory.dmp INDICATOR_EXE_Packed_ASPack behavioral2/memory/712-12-0x0000000000400000-0x000000000045E000-memory.dmp INDICATOR_EXE_Packed_ASPack -
Modifies AppInit DLL entries 2 TTPs
-
Processes:
resource yara_rule C:\PROGRA~3\Mozilla\lmzjuzl.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
lmzjuzl.exepid process 712 lmzjuzl.exe -
Drops file in Program Files directory 2 IoCs
Processes:
c4e649e8f86e8c204f694a151aa5a1d1b092ee969c0b0c6b78f0c84300aefa91.exelmzjuzl.exedescription ioc process File created C:\PROGRA~3\Mozilla\lmzjuzl.exe c4e649e8f86e8c204f694a151aa5a1d1b092ee969c0b0c6b78f0c84300aefa91.exe File created C:\PROGRA~3\Mozilla\yxbjhae.dll lmzjuzl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4e649e8f86e8c204f694a151aa5a1d1b092ee969c0b0c6b78f0c84300aefa91.exe"C:\Users\Admin\AppData\Local\Temp\c4e649e8f86e8c204f694a151aa5a1d1b092ee969c0b0c6b78f0c84300aefa91.exe"1⤵
- Drops file in Program Files directory
-
C:\PROGRA~3\Mozilla\lmzjuzl.exeC:\PROGRA~3\Mozilla\lmzjuzl.exe -qqbypme1⤵
- Executes dropped EXE
- Drops file in Program Files directory
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\PROGRA~3\Mozilla\lmzjuzl.exeFilesize
137KB
MD5205035cd9e723aa00b89298b3459edff
SHA117342cf97a2a35d661c1b539f50a9a0d0e5f4895
SHA2567ef24208654a81598e24e9cd764fecaae86deb018a607c35eef477404f707e57
SHA51267cd7a03c5044a36d5748206c0fd2e5d991bdfe12a63fca35961c62e763a1978abd12e7878dd690dd8194f4c660d9d2a73097b1269e10f50d57c303d7f4ce5cc
-
memory/712-11-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/712-17-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/712-14-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/712-13-0x0000000000C20000-0x0000000000C7B000-memory.dmpFilesize
364KB
-
memory/712-12-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1932-3-0x0000000002220000-0x000000000227B000-memory.dmpFilesize
364KB
-
memory/1932-10-0x0000000002220000-0x000000000227B000-memory.dmpFilesize
364KB
-
memory/1932-9-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/1932-4-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/1932-0-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1932-2-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB
-
memory/1932-1-0x0000000000400000-0x000000000045E000-memory.dmpFilesize
376KB