Analysis

  • max time kernel
    94s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 16:05

General

  • Target

    Nzdrezifc.exe

  • Size

    1.6MB

  • MD5

    4c2ce9043b1d69912f9996af9e9dc822

  • SHA1

    8f552bc5ada6ba3b752b143b78c1163c9a8b038a

  • SHA256

    1003f84d9b7d55fed67cfc07dfab36c949db35a2db71f44805d5c9d913004585

  • SHA512

    a3b161d05d26d83130cf0077e4a7b6941c0f0d1724c6f2d7e2df72a17cba798ea43b7b73f4f614ec6d800b9178721c0ff79620f14cf3921d46a5e982c2e5ac8d

  • SSDEEP

    49152:nComGj0k0tIgXCA0TOcBmqgQuiQ0s3N1W:WGjt0SgSptVCLV

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3476
      • C:\Users\Admin\AppData\Local\Temp\Nzdrezifc.exe
        "C:\Users\Admin\AppData\Local\Temp\Nzdrezifc.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4704
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3212

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3212-1093-0x0000000000400000-0x00000000004D0000-memory.dmp

      Filesize

      832KB

    • memory/3212-1096-0x00000000744F0000-0x0000000074CA0000-memory.dmp

      Filesize

      7.7MB

    • memory/3212-1098-0x0000000005150000-0x0000000005232000-memory.dmp

      Filesize

      904KB

    • memory/3212-1097-0x00000000744F0000-0x0000000074CA0000-memory.dmp

      Filesize

      7.7MB

    • memory/3212-1095-0x0000000005130000-0x0000000005138000-memory.dmp

      Filesize

      32KB

    • memory/3212-3947-0x00000000744F0000-0x0000000074CA0000-memory.dmp

      Filesize

      7.7MB

    • memory/3212-3945-0x0000000005480000-0x00000000054F2000-memory.dmp

      Filesize

      456KB

    • memory/4704-18-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-62-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-6-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-60-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-44-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-36-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-34-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-32-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-30-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-28-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-26-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-24-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-22-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-16-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-14-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-10-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-8-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-4-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-20-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-2-0x00000000056F0000-0x0000000005882000-memory.dmp

      Filesize

      1.6MB

    • memory/4704-12-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-66-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-64-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-3-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-58-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-56-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-54-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-52-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-50-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-48-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-47-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-42-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-40-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-38-0x00000000056F0000-0x000000000587B000-memory.dmp

      Filesize

      1.5MB

    • memory/4704-1077-0x00000000744F0000-0x0000000074CA0000-memory.dmp

      Filesize

      7.7MB

    • memory/4704-1078-0x00000000744F0000-0x0000000074CA0000-memory.dmp

      Filesize

      7.7MB

    • memory/4704-1079-0x0000000005880000-0x000000000598C000-memory.dmp

      Filesize

      1.0MB

    • memory/4704-1080-0x0000000005670000-0x00000000056BC000-memory.dmp

      Filesize

      304KB

    • memory/4704-1082-0x0000000005CB0000-0x0000000005D16000-memory.dmp

      Filesize

      408KB

    • memory/4704-1081-0x0000000005BD0000-0x0000000005C62000-memory.dmp

      Filesize

      584KB

    • memory/4704-1086-0x00000000744F0000-0x0000000074CA0000-memory.dmp

      Filesize

      7.7MB

    • memory/4704-1-0x0000000000AF0000-0x0000000000C90000-memory.dmp

      Filesize

      1.6MB

    • memory/4704-0-0x00000000744FE000-0x00000000744FF000-memory.dmp

      Filesize

      4KB

    • memory/4704-1087-0x00000000744F0000-0x0000000074CA0000-memory.dmp

      Filesize

      7.7MB

    • memory/4704-1088-0x00000000744F0000-0x0000000074CA0000-memory.dmp

      Filesize

      7.7MB

    • memory/4704-1089-0x0000000006820000-0x0000000006DC4000-memory.dmp

      Filesize

      5.6MB

    • memory/4704-1090-0x00000000062F0000-0x0000000006344000-memory.dmp

      Filesize

      336KB

    • memory/4704-1094-0x00000000744F0000-0x0000000074CA0000-memory.dmp

      Filesize

      7.7MB