Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 13:58

General

  • Target

    ac8zt2/install2.bat

  • Size

    93B

  • MD5

    e9b8f17fbc7e4edb879c3c73eb31e3ee

  • SHA1

    de810ec64d3e442ce4d86d28caec2382377bcd64

  • SHA256

    dbaf0ecc389a3c92ada1e141898653055a09f83f6d6937b76964249982b1c77f

  • SHA512

    a7322311a9012603eac6e6b036a5f2d7bbd264793ddb93f3313d086764850c4885fb4b2240987ba9d1e137fb9dfa366b1d0ecd6423ccea3561f312298a3c4c77

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 8 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac8zt2\install2.bat"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3548
    • C:\Users\Admin\AppData\Local\Temp\ac8zt2\di.exe
      di.exe C:\Windows\system32\msdrives\driverpp.sys
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4376
    • C:\Windows\system32\msdrives\msdrvctrl.exe
      C:\Windows\system32\msdrives\msdrvctrl.exe
      2⤵
      • Adds policy Run key to start application
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3040
      • C:\Windows\SysWOW64\regsvr32.exe
        C:\Windows\system32\regsvr32.exe /s "C:\Windows\iedrives.dll"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\System32\msdrives\msdrvctrl.exe

    Filesize

    32KB

    MD5

    14f19d9a7e8b0deff5f0c55e22c5c8dc

    SHA1

    a2bc1ea2ca8faac7642afe85cc3dfd5bd6a86089

    SHA256

    22b3255c710f79056dd3fca6775a9e069f855bda5d51d7edd823637e433f72a9

    SHA512

    4622c6fdc511988b03c76b487f8e497b8044c2345044450fb5665c49a843c3806290ee4e0d1e974169502384e411f27258ad107a618ec28fbae234b8c470f1f8

  • memory/3040-12-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3040-13-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4376-8-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/4376-9-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB