Analysis
-
max time kernel
450s -
max time network
488s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
02/06/2024, 19:18
Static task
static1
Behavioral task
behavioral1
Sample
zergtzaetgzeagegzeg.scr
Resource
win11-20240508-en
General
-
Target
zergtzaetgzeagegzeg.scr
-
Size
1.3MB
-
MD5
cdf01f02fdc0a38706412d6044e11138
-
SHA1
6b823724d280db7756335bf88019485d5bfe510b
-
SHA256
f8defa93420f93aa735b7192af534db25a0c8a0719fc836983df3e506141da23
-
SHA512
11c04dda9856be50af898aa13c2cadbce45ce785c29f3d4db248c962c3c8a983edcb04f9c3062b168a489ec427609cbc0663222a2f36000f2eb6c8921847af62
-
SSDEEP
24576:NJkzUy/HwUP5U6EFtBnQdQBlSzdX2zzR7/1UOXQxACinJeOEB7gZwSEqGsWv:SVvwOEVneQ+2OOXQrinJ26E
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2292 Aft.exe -
Executes dropped EXE 1 IoCs
pid Process 2292 Aft.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3192 zergtzaetgzeagegzeg.scr -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3192 zergtzaetgzeagegzeg.scr -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3192 zergtzaetgzeagegzeg.scr -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3192 wrote to memory of 2292 3192 zergtzaetgzeagegzeg.scr 81 PID 3192 wrote to memory of 2292 3192 zergtzaetgzeagegzeg.scr 81 PID 3192 wrote to memory of 2292 3192 zergtzaetgzeagegzeg.scr 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\zergtzaetgzeagegzeg.scr"C:\Users\Admin\AppData\Local\Temp\zergtzaetgzeagegzeg.scr" /S1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\Aft.exe"C:\Users\Admin\AppData\Local\Temp\Aft.exe" C:\Users\Admin\AppData\Local\Temp\zergtzaetgzeagegzeg.scr2⤵
- Deletes itself
- Executes dropped EXE
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD536427b95bf89d2a744436613fdd78d90
SHA15cfa33192dd50cbedfd84595d45591cdeb1a9bd1
SHA25653e97141c0e4bdbf1b3856ffb8de80b7e6b3e7e7177ce4adee2d56dda70c339e
SHA512453105e0e2d2ede54072da2be22e86c34c412c2c004b8ccfc13716dd6eeca1777c1d4aab032240205eb1fdbf5e3af1dafb62488ec1f5d376ef8619d5d0486e8c
-
Filesize
990B
MD590fd3cdfb97dd45ba97b2d496b71c7fa
SHA18d8f9fadd10e578d01dacdc29ca40080dd4d744c
SHA2567e974c38021e64c638abca255b15c7a1903344b034d5f36e0f076b4479c6ef4f
SHA51250529c2a90f149952a01d4ed341e5cf44023b0a21a862ab4bb33ad827981d4e2f94c2699d0f928969f2dcd77ef0724a3e1e962a1b9d1f989e0d37834141a5f80