Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/04/2024, 14:47

General

  • Target

    zcsy.exe

  • Size

    4.5MB

  • MD5

    e95d9a6573f6ae0d38b0bb9091d1d119

  • SHA1

    78bf33def809cf99bd5406c7a146a2cc40d239dd

  • SHA256

    957efed54ba42b5cff66d694c55530468e3c4ede6c83c3ed5da059d9a0eed0cf

  • SHA512

    e2e19b620a329d456ef182be61bc0b5cf889d7bd732a8332a84072b410d4a98baee95cb8f0a43e8a8eea4ffa89236e64d1f0e7ae1343b48b46ec9d009691134b

  • SSDEEP

    98304:qI4Ypmu2yGz36mpsPWdfnUbRyrvKIlXo13gUTsXbiLy/M:L/mu2yGz3tsPW1U9yrCRLTP6M

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\zcsy.exe
    "C:\Users\Admin\AppData\Local\Temp\zcsy.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3180
    • C:\Users\Admin\AppData\Local\Temp\is-7HA9P.tmp\zcsy.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-7HA9P.tmp\zcsy.tmp" /SL5="$50212,4505502,52224,C:\Users\Admin\AppData\Local\Temp\zcsy.exe"
      2⤵
      • Executes dropped EXE
      PID:1772

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\is-7HA9P.tmp\zcsy.tmp

          Filesize

          662KB

          MD5

          b45570ddb00885bfe9e878af91a90564

          SHA1

          66daf059333962a65735999e99eb868cf9d5e832

          SHA256

          29fedae831f5b1704e5b53351cd6b8d33a21b7971894a9d0385895d7662e264f

          SHA512

          84350f30f9372be749fa244190b7d35a02aa2ce1ded9b45d89c29135a384e1170a54ef1af7004836ab9c30770a44f7e085b0cb238786a6d93d7e8cdec993d768

        • memory/1772-10-0x0000000002240000-0x0000000002241000-memory.dmp

          Filesize

          4KB

        • memory/1772-14-0x0000000000400000-0x00000000004B4000-memory.dmp

          Filesize

          720KB

        • memory/1772-17-0x0000000002240000-0x0000000002241000-memory.dmp

          Filesize

          4KB

        • memory/3180-0-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/3180-2-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/3180-13-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB