Analysis

  • max time kernel
    102s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 01:39

General

  • Target

    Zeus-translation/temp/server/php/stats_main.php

  • Size

    9KB

  • MD5

    a83b4bf2ecbd81651b52c25b1c09d922

  • SHA1

    c81cb07eb32aa242c3b9a73b14ab053bbc2ca871

  • SHA256

    899153833618bf54a122e8a64d823f2744c4064675fff1f592e0d6ddb4d591a0

  • SHA512

    05d61a4166f2b6703dcdce05f7b861822df7dfb0d290f123e6322a5f63ad0d48abddd90c5f93191094fb5fb710cbe35ba8149ec0678e9834e1ae82c354a7b02f

  • SSDEEP

    192:b+WgObKnhv/UDQm6FaUNebjEyDeb2s4sMn+kbmLcnUd:3bKnd8Qm6QUNebj3eb2lSkbQcUd

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Zeus-translation\temp\server\php\stats_main.php
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Zeus-translation\temp\server\php\stats_main.php
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Zeus-translation\temp\server\php\stats_main.php"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    f18d4fb10596be9da8d3c0b5a04db959

    SHA1

    aaf7f3d3eb58e6faaec58dde48dcb2014a7fe243

    SHA256

    f2e18b9006a6644f5f420fea52c831245664041fd983cf75d9b9360f4555f0cc

    SHA512

    0cb2fd26e3d03a952e1402e9fe0912775afca4f1afb914cbde250e69958d2980cf6c49f67cc69193261869c5120eeb20e7a478e9c5b57cd343b5e51d79e260e5