Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 23:04
Static task
static1
Behavioral task
behavioral1
Sample
a03435dff2d05423a277962a642b60f14924d589eeb2d2cb2519798e297d15eb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a03435dff2d05423a277962a642b60f14924d589eeb2d2cb2519798e297d15eb.exe
Resource
win10v2004-20240802-en
General
-
Target
a03435dff2d05423a277962a642b60f14924d589eeb2d2cb2519798e297d15eb.exe
-
Size
31KB
-
MD5
8e4893a7ef1ddcd41c1d6b2be47b88a7
-
SHA1
bc05d918ca4113a2a597469f7b2344a7c4a00657
-
SHA256
a03435dff2d05423a277962a642b60f14924d589eeb2d2cb2519798e297d15eb
-
SHA512
b2aff25d707146144a8c066df1b234eb5aee6bc88903d501d549f1893415fe78dc6837b02b519f7b5aee4a9d54d58d28ced5a0b74a87c25660b7a3db81915920
-
SSDEEP
384:UMp3HU08dJlM1jpj0Z3g+4tdmuJc1PbJkOUcFnj+r9x5jHGuetJnQ7h/2S7g:UEHUblMVZ3kJOCaxletJnyh/2Wg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2344 zfbttcb.exe -
Loads dropped DLL 2 IoCs
pid Process 1732 a03435dff2d05423a277962a642b60f14924d589eeb2d2cb2519798e297d15eb.exe 1732 a03435dff2d05423a277962a642b60f14924d589eeb2d2cb2519798e297d15eb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a03435dff2d05423a277962a642b60f14924d589eeb2d2cb2519798e297d15eb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2344 1732 a03435dff2d05423a277962a642b60f14924d589eeb2d2cb2519798e297d15eb.exe 30 PID 1732 wrote to memory of 2344 1732 a03435dff2d05423a277962a642b60f14924d589eeb2d2cb2519798e297d15eb.exe 30 PID 1732 wrote to memory of 2344 1732 a03435dff2d05423a277962a642b60f14924d589eeb2d2cb2519798e297d15eb.exe 30 PID 1732 wrote to memory of 2344 1732 a03435dff2d05423a277962a642b60f14924d589eeb2d2cb2519798e297d15eb.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a03435dff2d05423a277962a642b60f14924d589eeb2d2cb2519798e297d15eb.exe"C:\Users\Admin\AppData\Local\Temp\a03435dff2d05423a277962a642b60f14924d589eeb2d2cb2519798e297d15eb.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\zfbttcb.exe"C:\Users\Admin\AppData\Local\Temp\zfbttcb.exe"2⤵
- Executes dropped EXE
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5b36a7c782b7b30cd9e9ccdf626292b50
SHA1916cc11d48edab0f54cf8a7e666e35bc3c6a66cd
SHA2566ac0bd3e7c01d111312c68f22e20f24105ae4659b0d22392f6a41db16864124c
SHA512e33a6be5a198f096477727cf72e32d7c694a835456c17708bd98e852777198c19358068b467041c6ccd4638fdac1fade20bb750d6ad18c71c7bc7995a6504295