Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 14:49
Static task
static1
Behavioral task
behavioral1
Sample
e363be771314616a653cba4975637a4c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e363be771314616a653cba4975637a4c.exe
Resource
win10v2004-20240508-en
General
-
Target
e363be771314616a653cba4975637a4c.exe
-
Size
320KB
-
MD5
e363be771314616a653cba4975637a4c
-
SHA1
aa14377449a6b83e30fa21a1208afdcbc5b5bfd0
-
SHA256
ef268c8b68b03063c8b802c381d1098f954cc6586eb2f66013bbf3ccec687abf
-
SHA512
440bb8192c3ba56ab740103a5e2f97b543bfe451626a59202529a782fb81abac165d421220a97ceaa58007207b7cb204c1d0261e6cf9d2226dce49dd18914609
-
SSDEEP
3072:tsFh2/HIdPOOjx/BM6C9yTqBnKp4ucfbLAbMYj4NfhANhirVkh34pLthEjQT68TU:tygOlq9y/FCbsbP2AkEjWbjcSbcY+CA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3004 ZNOBQGK.exe -
Loads dropped DLL 2 IoCs
pid Process 2736 cmd.exe 2736 cmd.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\windows\SysWOW64\ZNOBQGK.exe e363be771314616a653cba4975637a4c.exe File opened for modification C:\windows\SysWOW64\ZNOBQGK.exe e363be771314616a653cba4975637a4c.exe File created C:\windows\SysWOW64\ZNOBQGK.exe.bat e363be771314616a653cba4975637a4c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2884 e363be771314616a653cba4975637a4c.exe 3004 ZNOBQGK.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2884 e363be771314616a653cba4975637a4c.exe 2884 e363be771314616a653cba4975637a4c.exe 3004 ZNOBQGK.exe 3004 ZNOBQGK.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2736 2884 e363be771314616a653cba4975637a4c.exe 28 PID 2884 wrote to memory of 2736 2884 e363be771314616a653cba4975637a4c.exe 28 PID 2884 wrote to memory of 2736 2884 e363be771314616a653cba4975637a4c.exe 28 PID 2884 wrote to memory of 2736 2884 e363be771314616a653cba4975637a4c.exe 28 PID 2736 wrote to memory of 3004 2736 cmd.exe 30 PID 2736 wrote to memory of 3004 2736 cmd.exe 30 PID 2736 wrote to memory of 3004 2736 cmd.exe 30 PID 2736 wrote to memory of 3004 2736 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e363be771314616a653cba4975637a4c.exe"C:\Users\Admin\AppData\Local\Temp\e363be771314616a653cba4975637a4c.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\system32\ZNOBQGK.exe.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\windows\SysWOW64\ZNOBQGK.exeC:\windows\system32\ZNOBQGK.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3004
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78B
MD5d2014b165d456c802fffcf78bbe6e651
SHA1a3197f741cfc73f934fca38bb5769f4123ccaca6
SHA2568cc3fe4697b3413459fd739f19bb8234b328c7d53679f3fea6bd5021fe63709e
SHA512c3c895c02f189d5105802e6a883b39b027768af7d16b10ec87fad1e1662bca48e47ac02804ffe93580e9e5899b7e7f40effbe5fd2fdfb0882594f7baa8373bb8
-
Filesize
320KB
MD5b25c842af429a3244f957de8c21d0556
SHA13de6c521751be96e302d46efd270a014fc0683a8
SHA2561236a0cd7893b816ef363aca020213071409ec6ef2a1169e4ef0226e8e8aaaab
SHA5127148fc0cacb9132cddd9f9753f28d53efeebc6ef90a4ccb91d7163ea717428bb3facd6e5e39435c26e32d9b1224c376b7bf4eceaaaa6ae25cc4aac266568b296