Analysis

  • max time kernel
    103s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 01:39

General

  • Target

    Zeus-translation/temp/server/php/reports_files.lng.ru.php

  • Size

    2KB

  • MD5

    35b9bdc91f40d8ade44fb9c84b3616d5

  • SHA1

    226121c0dc33d2396f6eb0fbb6fca3e0920e3b95

  • SHA256

    8a9fafd383005a4b6b17c13ec8c81e21e6c63ea05393c43614a4fc68c9fda87b

  • SHA512

    136b7327bb8d8eea8f53ce8000d2b799fad3fb4a5eaeae9b46ae7cb04a0bda3f998965649f4308a9497bde762bb6090495d2cd94d91715d2f7045dcacd41a86b

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Zeus-translation\temp\server\php\reports_files.lng.ru.php
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Zeus-translation\temp\server\php\reports_files.lng.ru.php
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Zeus-translation\temp\server\php\reports_files.lng.ru.php"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    f2c7bfcfe2fabe413209daa4a456370d

    SHA1

    2ad802bd78967e1464f4262f9029a4ff2fe4696f

    SHA256

    e5bc129270d90866f19efecd71812ccf30f6045b7af107b0240e83529a4e34b8

    SHA512

    b2378cf4faa348fb08549282bd37230ac2c0ac7c8b38bb774666e8f10507bb27e0f4bb50b82b53890cf89ba5c804197b0b095ce54f18339eb92a1399eda25bc0