Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 01:39

General

  • Target

    Zeus-translation/temp/server/php/reports_jn.php

  • Size

    6KB

  • MD5

    03cd43dd61b907d05cda58c69e08ee9f

  • SHA1

    dcf90f10677b408237cc651fd49440bc2033f623

  • SHA256

    c2092dc124047cfb98c8a57c68d1b596d3cc15d605864f1bbd7eebc511dc2986

  • SHA512

    41c089b2e0146fd1632aad5eb81e9059040294ed124745f17edfbc80f20b909ef8a83f0e6a78f71933f24d473fa26e2d10d61f20e1d6121d4a6587603cca117d

  • SSDEEP

    192:JeZRdO+MIA+i5L8Kv+uJ0M7u6VrCy3YTDo:4WXIAXfW0r8Ts

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Zeus-translation\temp\server\php\reports_jn.php
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Zeus-translation\temp\server\php\reports_jn.php
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2128
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Zeus-translation\temp\server\php\reports_jn.php"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    940df796e573399e1dcca16e6b96c593

    SHA1

    bf34997cbd0c4bf8b8b4909565e3c2932e041b92

    SHA256

    24490a8374918bdb8704034539817c5e8ed1de189246ed8301f79403772dd743

    SHA512

    58b78281ce5ca594f707be452d76f7ee62dfc9002ac00f60a49398ae668343f65c57acb36548baeac4fed297883780b7248e59f03e66673533456da36522c49e