Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 06:52
Behavioral task
behavioral1
Sample
53fd48d989c02c4cfd7d7cdbc9540940N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
53fd48d989c02c4cfd7d7cdbc9540940N.exe
Resource
win10v2004-20240802-en
General
-
Target
53fd48d989c02c4cfd7d7cdbc9540940N.exe
-
Size
15KB
-
MD5
53fd48d989c02c4cfd7d7cdbc9540940
-
SHA1
ba8ebe275b24c823366ba4f06ccf2a0b6d126f72
-
SHA256
2ee071579da35565f77a2dc017d1d86f82a08bb1922e3f2e0e9507e292b39e15
-
SHA512
8d61cb60c33df2eba0a92f7d9282e129e8989a2e619e6d247c0befd44d9c91d417a4111715d1d6a1551c6899efff3e043686c7ae35f74fb4a6c2b06342d9dead
-
SSDEEP
384:IO3qdXlIQV0YXd45xuYiMcRWnPbeVGWLwbbbVHHHH4fff+:IO3EVdV0YXd4DuicNV3Ffff+
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2092 attrib.exe -
Deletes itself 1 IoCs
pid Process 1344 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2400 zskhost.exe -
resource yara_rule behavioral1/memory/2376-0-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/files/0x0008000000012102-3.dat upx behavioral1/memory/2376-6-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2400-7-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2400-10-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2400-13-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2400-16-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\zskhost.exe 53fd48d989c02c4cfd7d7cdbc9540940N.exe File opened for modification C:\Windows\Debug\zskhost.exe 53fd48d989c02c4cfd7d7cdbc9540940N.exe File opened for modification C:\Windows\Debug\zskhost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53fd48d989c02c4cfd7d7cdbc9540940N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zskhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2376 53fd48d989c02c4cfd7d7cdbc9540940N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2092 2376 53fd48d989c02c4cfd7d7cdbc9540940N.exe 30 PID 2376 wrote to memory of 2092 2376 53fd48d989c02c4cfd7d7cdbc9540940N.exe 30 PID 2376 wrote to memory of 2092 2376 53fd48d989c02c4cfd7d7cdbc9540940N.exe 30 PID 2376 wrote to memory of 2092 2376 53fd48d989c02c4cfd7d7cdbc9540940N.exe 30 PID 2376 wrote to memory of 1344 2376 53fd48d989c02c4cfd7d7cdbc9540940N.exe 33 PID 2376 wrote to memory of 1344 2376 53fd48d989c02c4cfd7d7cdbc9540940N.exe 33 PID 2376 wrote to memory of 1344 2376 53fd48d989c02c4cfd7d7cdbc9540940N.exe 33 PID 2376 wrote to memory of 1344 2376 53fd48d989c02c4cfd7d7cdbc9540940N.exe 33 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2092 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\53fd48d989c02c4cfd7d7cdbc9540940N.exe"C:\Users\Admin\AppData\Local\Temp\53fd48d989c02c4cfd7d7cdbc9540940N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\zskhost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2092
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\53FD48~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1344
-
-
C:\Windows\Debug\zskhost.exeC:\Windows\Debug\zskhost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5b74374e2e1c6b587442917aefee3e21a
SHA1c8b7d5da9bc2afb6a1b86be62bc5c0fc83edc021
SHA256e7b4f691746b293a5aec5de8b749c202c13686c395ca229c54e8359358ebe27f
SHA512f32a7420b723bc668aa129fb488cdd960cb9e7a946383a9970484a4a03303c7c2b3b88d2060872b7de6e8b6207b8603ae0d2b94106acb8f61097f1a71350508d