Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 03:20

General

  • Target

    d27f28076e97c63401e3397c8e2a7d945da13f2292da9a6c214b6a39dc432e6c.exe

  • Size

    311KB

  • MD5

    44508d7d25e5a3d394ad7199cb35a6af

  • SHA1

    65e5c84c4b3ceef9a27a1dc2358c1d2726b335c2

  • SHA256

    d27f28076e97c63401e3397c8e2a7d945da13f2292da9a6c214b6a39dc432e6c

  • SHA512

    2d3f785980de8273dac3d66bd379a52b2dc9aeab358063be90db1cc3eacbaeaaf1a024ef108e0797a43b92ed6ffdf7a8f0a8af8315dafa1f90f471a155200e6b

  • SSDEEP

    6144:uY7BO63UKCweQ7Ovc93dRBsIpJwK8aWlIeD4d2WYcSA2MuLH1bJp:D7mECN3A2T5X

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d27f28076e97c63401e3397c8e2a7d945da13f2292da9a6c214b6a39dc432e6c.exe
    "C:\Users\Admin\AppData\Local\Temp\d27f28076e97c63401e3397c8e2a7d945da13f2292da9a6c214b6a39dc432e6c.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Users\Admin\ziomim.exe
      "C:\Users\Admin\ziomim.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\ziomim.exe

    Filesize

    311KB

    MD5

    b3124e3933675546e12e0d484a04f510

    SHA1

    3f08623d66fe78849ebceb2097500d0d4f182b4f

    SHA256

    1ede704c1763d12eb813c38c215cdf2c658fb44cee756e595e53047d1dfd8fbb

    SHA512

    1cf1a217b95766677a8d9c5e14035826cc8f329636afb95552ab6ff4b03b8efbc9739e7a8f8226ba3711d3dd5a6f433e5c1b79cc171754cb7f2aa91713d358c4