Analysis

  • max time kernel
    140s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    30/05/2024, 02:04

General

  • Target

    b608b48296ac78df7cbee4fae8e0d9e6363c733678bd23725d53a3d39892a330.exe

  • Size

    445KB

  • MD5

    1d2f0de5c5d30250dccb891535187192

  • SHA1

    33022927ad87d8a151c03cdaec3762c57e6c898f

  • SHA256

    b608b48296ac78df7cbee4fae8e0d9e6363c733678bd23725d53a3d39892a330

  • SHA512

    7813d2e8c6c7112926cf398fbcfdea1a6a852ea45f680649076355d80f7bd6ca527f681f61a3d2e6ff3c2fa0164d84658c64a728abe941ce760415dd8c189adc

  • SSDEEP

    6144:WdspDeDrxkg/vrMuJIgwhEFHyOrJcX/Pgqwzm5IzkWjS4e4azExBKO1t4Kb70NqY:s8kxNhOZElO5kkWjhD4A45lGU

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 17 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b608b48296ac78df7cbee4fae8e0d9e6363c733678bd23725d53a3d39892a330.exe
    "C:\Users\Admin\AppData\Local\Temp\b608b48296ac78df7cbee4fae8e0d9e6363c733678bd23725d53a3d39892a330.exe"
    1⤵
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:888
    • C:\Windows\ZNXTTQU.EXE
      C:\Windows\ZNXTTQU.EXE
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PerfLogs\EES.EXE

    Filesize

    445KB

    MD5

    61e92137ecb626100baae82916be54bc

    SHA1

    11f6fdcf6101882a0c5b6390160b801dc7e9498c

    SHA256

    8f7d03d01256eeca6e286e93b102dd3a389efacaa0642b2bedeecda5e808b993

    SHA512

    80430512a582c051c716f95c07731f590e512c1d858f84ce438efaa87641a7c8810daf9ea6004070947c01fe01a45393c31f653e3168e14dd36a965368387fd3

  • C:\Windows\ZNXTTQU.EXE

    Filesize

    446KB

    MD5

    1412b5c6112b8b4007c014ed2fb53e5d

    SHA1

    da41440372030f55d33a30bb22428032a6b30575

    SHA256

    f7eb4efc8f4487128c46e72920f8dbf951c06a95bb59cc83f3f88ad1bda48fce

    SHA512

    49f33eadf2fb7d7bc6262afca03f14a77a3a3bb5fa57eba86b8b7e56f69b531975daf4a98204d7e96c8d7200a406beedbd6a7032a7dc585e3b8c8cda9014e218

  • memory/888-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/888-22-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2740-27-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2740-30-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2740-25-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2740-26-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2740-23-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2740-28-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2740-29-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2740-24-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2740-31-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2740-32-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2740-33-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2740-34-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2740-36-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2740-37-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2740-38-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB