Resubmissions

21-08-2024 19:30

240821-x76q3sweqg 10

21-08-2024 17:42

240821-v92h2avgpj 10

12-06-2024 16:01

240612-tgps4a1bqh 10

Analysis

  • max time kernel
    60s
  • max time network
    67s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240611-en
  • resource tags

    arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    12-06-2024 16:01

General

  • Target

    a9a89ed0d139fbc436794f5d3a8e58c547247039d8c86767b1e2f2bce40e390f.exe

  • Size

    41KB

  • MD5

    ec9e58951bf3e0ff91c5f86cae637dc4

  • SHA1

    8f2e5fce00e3f5265deabaa71a9243d1b936395c

  • SHA256

    a9a89ed0d139fbc436794f5d3a8e58c547247039d8c86767b1e2f2bce40e390f

  • SHA512

    466d31863ee8d7765b436f75588da017b095ac66f86deb8dff41fc2349de456da8dbb59bec863c4a754fc68a210ad8e1c578d968312c9ea0595d4aab7fb2f0a5

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/:AEwVs+0jNDY1qi/q

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9a89ed0d139fbc436794f5d3a8e58c547247039d8c86767b1e2f2bce40e390f.exe
    "C:\Users\Admin\AppData\Local\Temp\a9a89ed0d139fbc436794f5d3a8e58c547247039d8c86767b1e2f2bce40e390f.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4948
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:4848

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0KQ4ZSVQ\search[2].htm
    Filesize

    25B

    MD5

    8ba61a16b71609a08bfa35bc213fce49

    SHA1

    8374dddcc6b2ede14b0ea00a5870a11b57ced33f

    SHA256

    6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

    SHA512

    5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8S54EFAG\M08PY7BN.htm
    Filesize

    185KB

    MD5

    a9e37e0581006c80d4404d1e235653f4

    SHA1

    0cb680c013e5db31e289a86f1fad82991853739b

    SHA256

    365f351dee2c9069d66a78790d6a0640b3631b811832d8658a031efb8adebe8a

    SHA512

    9f9ce8687fadf8685ae866dbccc90e7f0f77bcd28aab303d5c78f0602d331fa6495f3137492c7a8e392798b063f8c337520800eba73ad71652f92679a4196fbe

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\HK7I7WRB\search[4].htm
    Filesize

    116KB

    MD5

    6f4904e0fe241fe4c43995062748cedd

    SHA1

    0e6b18a2ca68a0dd9d0ecd706e1f81746f6bf733

    SHA256

    de2099d8cf8f338da65b85e059d2a733d464d421e2d87a417c89830d6217e6df

    SHA512

    d98b5fa04519677862cda34ba7f7d1ce062485ff610082950a9c754a95c24935960e95f58e7b6a444dda027cd3c0eb3e81750cc5eaf6c79cef8846b0f6859f5a

  • C:\Users\Admin\AppData\Local\Temp\tmp4C77.tmp
    Filesize

    41KB

    MD5

    ec9e58951bf3e0ff91c5f86cae637dc4

    SHA1

    8f2e5fce00e3f5265deabaa71a9243d1b936395c

    SHA256

    a9a89ed0d139fbc436794f5d3a8e58c547247039d8c86767b1e2f2bce40e390f

    SHA512

    466d31863ee8d7765b436f75588da017b095ac66f86deb8dff41fc2349de456da8dbb59bec863c4a754fc68a210ad8e1c578d968312c9ea0595d4aab7fb2f0a5

  • C:\Users\Admin\AppData\Local\Temp\zincite.log
    Filesize

    128B

    MD5

    0bc7e43253e89906886862f68411ee36

    SHA1

    0b4a3f10af9c94a277c34556099bd9ba7dacb07d

    SHA256

    e9c1778a7f839a7ddaeac546417d51c05e0fbf24522a26f6716849ba95aadefc

    SHA512

    1c94161033b8ee4a3b198a4faa30f505a803730e0f120901bd3fc8335532f6199f28a2a1e7c1b821be87b81a8cd426d99896afd30f826af92a4f6fae602cb764

  • C:\Users\Admin\AppData\Local\Temp\zincite.log
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • C:\Windows\services.exe
    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/4848-26-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/4848-31-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/4848-24-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/4848-19-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/4848-14-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/4848-6-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/4948-0-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/4948-30-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/4948-13-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB