Analysis
-
max time kernel
18s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 10:09
Static task
static1
Behavioral task
behavioral1
Sample
injector.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
injector.exe
Resource
win10v2004-20240709-en
General
-
Target
injector.exe
-
Size
507KB
-
MD5
15fa4864c56c1bc724f1098aba8f08fb
-
SHA1
faad863bfde036ac3ea9c65090fcdf8716d8147c
-
SHA256
3de2e86dde2444292306215c1082423e8ce8f99f5bf6e036dfb07ac32570c993
-
SHA512
75b5bd9273078823218cd061cd62d7cf8a8dd98d9e656007998dec0703169d738c760bc17ee51d5c89065c0b43d41e67e53cda3075d228e26d440d099b7e8465
-
SSDEEP
6144:oG0Sx4x1VJswRYC8baxFIl+DJQATVbohyDOJh67V4CWWlI+8NyxNX2NnRI/d:Wi44wRrEl+DJLdonaz1mNRi
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\rByFuiIEOscViFziykixlToDzlw\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\rByFuiIEOscViFziykixlToDzlw" IZGKX.exe -
Executes dropped EXE 1 IoCs
pid Process 2876 IZGKX.exe -
Loads dropped DLL 1 IoCs
pid Process 2612 injector.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\SoftwareDistribution\Download\IZGKX.exe injector.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2876 IZGKX.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2876 IZGKX.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2736 2612 injector.exe 31 PID 2612 wrote to memory of 2736 2612 injector.exe 31 PID 2612 wrote to memory of 2736 2612 injector.exe 31 PID 2612 wrote to memory of 2180 2612 injector.exe 32 PID 2612 wrote to memory of 2180 2612 injector.exe 32 PID 2612 wrote to memory of 2180 2612 injector.exe 32 PID 2612 wrote to memory of 2876 2612 injector.exe 33 PID 2612 wrote to memory of 2876 2612 injector.exe 33 PID 2612 wrote to memory of 2876 2612 injector.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\injector.exe"C:\Users\Admin\AppData\Local\Temp\injector.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2736
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color 92⤵PID:2180
-
-
C:\Windows\SoftwareDistribution\Download\IZGKX.exe"C:\Windows\SoftwareDistribution\Download\IZGKX.exe"2⤵
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD59886a738e05f8a8fe04e9d0c81cc0909
SHA1f659c6a123eb11f6f34f618265dbd54a9aa7f5e3
SHA256abf99bd1d851c4c7015b999e81fb080e7e1147973e6a3a77c8ba7895cc8abbb6
SHA5120d3b9e9a1a38efe1e963b929a33a8a13d4636d8056ab04fce958333db983b9fb401946c9b6990d18e9c2e2d4c2dbd2fb6aae5385e4234a5d86ef8adb98d56a21