Analysis

  • max time kernel
    140s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 23:43

General

  • Target

    zplayer.exe

  • Size

    5.4MB

  • MD5

    d23b178ba71db4bb977d8772eef0b418

  • SHA1

    1015b78a03613a2e62d742c32810ef2dc6a63097

  • SHA256

    5fe57668949a643d1673494fc93412cd871fa2845c82cfd5d80fe08efa5252dd

  • SHA512

    011ee41b8c87e667e18f700bdff9be4874c1c7c490a8d0e1ed8c1a3d76f47f4d76c390930e7272b0e62e5d029c28b0d9d0f4e3452bebfb0620a443623c69afa6

  • SSDEEP

    98304:0cXge+RjtaLLB9tna7RwF3cyfDC7FAa3:0kta7Py

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\zplayer.exe
    "C:\Users\Admin\AppData\Local\Temp\zplayer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1828

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1828-0-0x00000000002E0000-0x00000000002E1000-memory.dmp

          Filesize

          4KB

        • memory/1828-1-0x0000000000400000-0x00000000009C1000-memory.dmp

          Filesize

          5.8MB

        • memory/1828-3-0x00000000002E0000-0x00000000002E1000-memory.dmp

          Filesize

          4KB