Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 04:55
Static task
static1
Behavioral task
behavioral1
Sample
e529f420900539bbf58bb2a04f6ed73a46a37e1aa6a4cd584df57ef7d00dcfc7.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e529f420900539bbf58bb2a04f6ed73a46a37e1aa6a4cd584df57ef7d00dcfc7.dll
Resource
win10v2004-20240508-en
General
-
Target
e529f420900539bbf58bb2a04f6ed73a46a37e1aa6a4cd584df57ef7d00dcfc7.dll
-
Size
1.0MB
-
MD5
965d74e22a34da838f1f4f922002465e
-
SHA1
760dfc1106f85a5e8ab70788ac39128a9a377ffb
-
SHA256
e529f420900539bbf58bb2a04f6ed73a46a37e1aa6a4cd584df57ef7d00dcfc7
-
SHA512
2e93b7d1e082b80cafca881220e2405ba098af68722cb33dc26afbfe93c8086d4d015c8cc7cc69a8db17d42d65c77a4ac804dc6edf66050c465bd8778566fe09
-
SSDEEP
6144:gi05kH9OyU2uv5SRf/FWgFgtMgqIRAUW9kVYeVprU4wfhTv5xD2ZP0GVGdXcukT4:TrHGPv5SmptxDmUWuVZkxikdXcq
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1232 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\Javhf = "\"C:\\Users\\Admin\\AppData\\Roaming\\ZVUGy\\TpmInit.exe\"" Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\6374\javaws.exe cmd.exe File opened for modification C:\Windows\system32\6374\javaws.exe cmd.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2828 schtasks.exe -
Modifies registry class 9 IoCs
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\MSCFile Process not Found Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\MSCFile\shell\open\command Process not Found Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\MSCFile\shell Process not Found Key deleted \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\MSCFile\shell\open Process not Found Key deleted \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\MSCFile\shell Process not Found Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\MSCFile Process not Found Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\MSCFile\shell\open Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\MSCFile\shell\open\command\ = "C:\\Windows\\system32\\cmd.exe /c C:\\Users\\Admin\\AppData\\Local\\Temp\\ASAhT.cmd" Process not Found Key deleted \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\MSCFile\shell\open\command Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2320 rundll32.exe 2320 rundll32.exe 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1232 wrote to memory of 2736 1232 Process not Found 28 PID 1232 wrote to memory of 2736 1232 Process not Found 28 PID 1232 wrote to memory of 2736 1232 Process not Found 28 PID 1232 wrote to memory of 2484 1232 Process not Found 29 PID 1232 wrote to memory of 2484 1232 Process not Found 29 PID 1232 wrote to memory of 2484 1232 Process not Found 29 PID 1232 wrote to memory of 2536 1232 Process not Found 31 PID 1232 wrote to memory of 2536 1232 Process not Found 31 PID 1232 wrote to memory of 2536 1232 Process not Found 31 PID 2536 wrote to memory of 2984 2536 cmd.exe 33 PID 2536 wrote to memory of 2984 2536 cmd.exe 33 PID 2536 wrote to memory of 2984 2536 cmd.exe 33 PID 1232 wrote to memory of 2732 1232 Process not Found 34 PID 1232 wrote to memory of 2732 1232 Process not Found 34 PID 1232 wrote to memory of 2732 1232 Process not Found 34 PID 1232 wrote to memory of 2228 1232 Process not Found 35 PID 1232 wrote to memory of 2228 1232 Process not Found 35 PID 1232 wrote to memory of 2228 1232 Process not Found 35 PID 1232 wrote to memory of 2832 1232 Process not Found 37 PID 1232 wrote to memory of 2832 1232 Process not Found 37 PID 1232 wrote to memory of 2832 1232 Process not Found 37 PID 2832 wrote to memory of 2864 2832 eventvwr.exe 38 PID 2832 wrote to memory of 2864 2832 eventvwr.exe 38 PID 2832 wrote to memory of 2864 2832 eventvwr.exe 38 PID 2864 wrote to memory of 2828 2864 cmd.exe 40 PID 2864 wrote to memory of 2828 2864 cmd.exe 40 PID 2864 wrote to memory of 2828 2864 cmd.exe 40 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e529f420900539bbf58bb2a04f6ed73a46a37e1aa6a4cd584df57ef7d00dcfc7.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320
-
C:\Windows\system32\TpmInit.exeC:\Windows\system32\TpmInit.exe1⤵PID:2736
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\EaS6cU.cmd1⤵PID:2484
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Delete /F /TN "User_Feed_Synchronization-{0f3f26ce-e23a-888f-036b-ddb6939885d4}"1⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\system32\schtasks.exeschtasks.exe /Delete /F /TN "User_Feed_Synchronization-{0f3f26ce-e23a-888f-036b-ddb6939885d4}"2⤵PID:2984
-
-
C:\Windows\system32\javaws.exeC:\Windows\system32\javaws.exe1⤵PID:2732
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\8FyUuMy.cmd1⤵
- Drops file in System32 directory
PID:2228
-
C:\Windows\System32\eventvwr.exe"C:\Windows\System32\eventvwr.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\ASAhT.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\system32\schtasks.exeschtasks.exe /Create /F /TN "Lizdxxpaecrde" /SC minute /MO 60 /TR "C:\Windows\system32\6374\javaws.exe" /RL highest3⤵
- Creates scheduled task(s)
PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5d56f8967ea00991dcae618e59dcee1aa
SHA1b0dcb89279f6e442c7fe572bc36e6dc1d4440297
SHA256a8d0e2d673f8ba38d0452b066ae987c56b1454b2aa3690647f793ed03a1a22c2
SHA512c3a847c9d9b1062cc26f32a1a77d57b483f83d738463c55820cb3f354999f862cb1f73595b6409cad1e0e6b3fdd48b443bdaee7b4d7094d93d7fbb717861adc2
-
Filesize
192B
MD5812b51e12d67a295c09f2163b1dc736e
SHA10710bfb6ff03298776fceafc353187eb7ae20176
SHA256a9d3ccd5e1403c1903e8cf275baf8a2215ac6479b92b9d69a28140fb481fa4ae
SHA512f00c95465dfc8bd6ba127b77540c857293bcd0fc4688cf7764232f6e91878963a1fe4e2faa5244b46c40c14262b24829f386e7d348f965063fb420b5ed45b901
-
Filesize
130B
MD5810a7fffddea43ce08bd562fff810ba7
SHA1d7f4a3698afd0577f72dcb6e845a02af28a3b768
SHA256657c80cf46d2fd3d07d2a020efaf9546362933a5588003f80e48c768194e8ba2
SHA51250c79694c02c71fa051ca3c8bfab8707be799dfb6b4b4c3b7d7d622be0db77ad4db2b5240e4202467027c7977e961a21e18beb0e90b131721fd98cc55cdb5398
-
Filesize
230B
MD5c9e9b6b1d0a38dd2ef4f54cae8b056d7
SHA1af73fcfb97ddfb7023b660516835196dfd86d482
SHA256bbd4f6ec383e9d9dc22bbe81a6049b1b842981b447dee2b5c0d75371d8bd6a99
SHA512fb066cb75cf878b194038c3a2f3372ae12f2ef07ed2885e0dfd111b04924119adee988fc4af96816ba25cbd82e6afd9ac4d95fac04b01d9f00713d03b185cd26
-
Filesize
1.0MB
MD5654895c603df6db445895f36444d010b
SHA12188188d2c0b5b1ee36754fb37ca4fd74360656f
SHA256c368fa47b2f49e7f9ee0c144199ae647be61237896f764c0419d4056a272cd0f
SHA51252bef9558f261d36f16f928ee335282579b42906d3b46876c2dfbcf0c061ba0c661e32a337a655487e9e8eae22f9edb4e128416959458e7c7b02cec822a27a2a
-
Filesize
878B
MD550db45fdbdaaa46fbd5e5ac0bb6f93df
SHA14181697a6b60125d8bf30ddaa3bdded9c80208d4
SHA256a6b663465bb47d165107b0690d4592a3f0c9dc36063a75809ec267ab00a8b0f2
SHA5127d841dca6ef16da4ae8a58e1ea9da91a4c94b58e5505c1fb8dbee4bd50aa9b1e129ff6651427679377091692ebdba46f70f55cbe6f77758214fac7e3109fcb99
-
Filesize
112KB
MD58b5eb38e08a678afa129e23129ca1e6d
SHA1a27d30bb04f9fabdb5c92d5150661a75c5c7bc42
SHA2564befa614e1b434b2f58c9e7ce947a946b1cf1834b219caeff42b3e36f22fd97c
SHA512a7245cde299c68db85370ae1bdf32a26208e2cda1311afd06b0efd410664f36cafb62bf4b7ce058e203dcc515c45ebdef01543779ead864f3154175b7b36647d