Overview
overview
8Static
static
7ac8zt2/di.exe
windows7-x64
5ac8zt2/di.exe
windows10-2004-x64
5ac8zt2/driverpp.sys
windows7-x64
1ac8zt2/driverpp.sys
windows10-2004-x64
1ac8zt2/iedrives.dll
windows7-x64
6ac8zt2/iedrives.dll
windows10-2004-x64
6ac8zt2/install.bat
windows7-x64
5ac8zt2/install.bat
windows10-2004-x64
5ac8zt2/install2.bat
windows7-x64
8ac8zt2/install2.bat
windows10-2004-x64
8ac8zt2/msdrv.exe
windows7-x64
5ac8zt2/msdrv.exe
windows10-2004-x64
5ac8zt2/msdrvctrl.exe
windows7-x64
8ac8zt2/msdrvctrl.exe
windows10-2004-x64
8ac8zt2/start-soft.bat
windows7-x64
1ac8zt2/start-soft.bat
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 13:58
Behavioral task
behavioral1
Sample
ac8zt2/di.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ac8zt2/di.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
ac8zt2/driverpp.sys
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
ac8zt2/driverpp.sys
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
ac8zt2/iedrives.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
ac8zt2/iedrives.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
ac8zt2/install.bat
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
ac8zt2/install.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
ac8zt2/install2.bat
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
ac8zt2/install2.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
ac8zt2/msdrv.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
ac8zt2/msdrv.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
ac8zt2/msdrvctrl.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
ac8zt2/msdrvctrl.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
ac8zt2/start-soft.bat
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
ac8zt2/start-soft.bat
Resource
win10v2004-20240910-en
General
-
Target
ac8zt2/install.bat
-
Size
304B
-
MD5
3a80487df38d375da59fce122961b561
-
SHA1
d61f2ef16b8cf8ccdceaf5a0078108b8634faa8a
-
SHA256
243930c9a6eb6369057d681f6fb32374d7dcb46b2bafae4b638e84bfb1a023a8
-
SHA512
b90329a1cd816a57a28faaae473b1e9d7b03af780575967b715f4b35bc5817f58dcb84968aaa73b375b302e638c2b974f5b1e173a033a43084559e45f760e477
Malware Config
Signatures
-
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\system32\msdrives\iedrives.dll cmd.exe File created C:\Windows\system32\msdrives\msdrv.EXE cmd.exe File opened for modification C:\Windows\system32\msdrives\msdrv.EXE cmd.exe File created C:\Windows\system32\msdrives\msdrvctrl.exe cmd.exe File opened for modification C:\Windows\system32\msdrives\msdrvctrl.exe cmd.exe File created C:\Windows\system32\msdrives\driverpp.sys cmd.exe File opened for modification C:\Windows\system32\msdrives\driverpp.sys cmd.exe File created C:\Windows\system32\msdrives\iedrives.dll cmd.exe -
resource yara_rule behavioral7/memory/2068-8-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral7/memory/2068-9-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2068 di.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 476 Process not Found -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2068 2388 cmd.exe 32 PID 2388 wrote to memory of 2068 2388 cmd.exe 32 PID 2388 wrote to memory of 2068 2388 cmd.exe 32 PID 2388 wrote to memory of 2068 2388 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ac8zt2\install.bat"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\ac8zt2\di.exedi.exe C:\Windows\system32\msdrives\driverpp.sys2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2068
-