Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 21:14

General

  • Target

    536f5a6d02853fae8ea9c70c98051174870e0efe33f2061b513db83ec0bebda1.exe

  • Size

    29KB

  • MD5

    5222c6d3c181ac351674cff2286b64e9

  • SHA1

    61d5c5e332678f2bd5570cf81d99aca14ca99baf

  • SHA256

    536f5a6d02853fae8ea9c70c98051174870e0efe33f2061b513db83ec0bebda1

  • SHA512

    4617287045372ee13eb036942505c959092157ee21dc5852aa608bd3ca6878cba6786dea8813a24c3d591cbb3777e9f30e0f24eb0f2ed9060ee9b1f3526b4836

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/Ez:AEwVs+0jNDY1qi/qe

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\536f5a6d02853fae8ea9c70c98051174870e0efe33f2061b513db83ec0bebda1.exe
    "C:\Users\Admin\AppData\Local\Temp\536f5a6d02853fae8ea9c70c98051174870e0efe33f2061b513db83ec0bebda1.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp30A5.tmp

    Filesize

    29KB

    MD5

    c7f36ee0ebdbad03662229da4cdb8b4e

    SHA1

    776540b93b7eb3a3e743090c8ff43eb0016d2368

    SHA256

    8a024a979a9114fffe0d06f940adb1def729f1109d2c07d4e17f042ab72d748f

    SHA512

    019b2eea0581e480964da959c26a61efa777b3b520eac52fce35bdb176a4f0ff8e83ac6c9df5930ad4ca7321d0ec6fd00341ed37da86fe6520c5c49bc89e6469

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    352B

    MD5

    a3db47305926c8246eabcae189baa3b4

    SHA1

    76849f0bcf1406f0633ac785121fea62a83a9728

    SHA256

    53c2743104d65268f825e614ad0623d83677c4f942ffb2efaf10e77c831aa2d4

    SHA512

    8d346b2c5ccd07a167341848794404bad9b6d0620f3cc799439e3bec1da982af1264ccc5ad6f8151d229c495d0de95edfd06644843013b52404f473a1f780805

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/2732-0-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2732-4-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2732-89-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2732-16-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2732-84-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2732-82-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2732-23-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2732-53-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2792-40-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2792-30-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2792-47-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2792-52-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2792-54-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2792-35-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2792-59-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2792-42-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2792-28-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2792-22-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2792-83-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2792-17-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2792-85-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2792-90-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2792-10-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB