Overview
overview
8Static
static
7ac8zt2/di.exe
windows7-x64
5ac8zt2/di.exe
windows10-2004-x64
5ac8zt2/driverpp.sys
windows7-x64
1ac8zt2/driverpp.sys
windows10-2004-x64
1ac8zt2/iedrives.dll
windows7-x64
6ac8zt2/iedrives.dll
windows10-2004-x64
6ac8zt2/install.bat
windows7-x64
5ac8zt2/install.bat
windows10-2004-x64
5ac8zt2/install2.bat
windows7-x64
8ac8zt2/install2.bat
windows10-2004-x64
8ac8zt2/msdrv.exe
windows7-x64
5ac8zt2/msdrv.exe
windows10-2004-x64
5ac8zt2/msdrvctrl.exe
windows7-x64
8ac8zt2/msdrvctrl.exe
windows10-2004-x64
8ac8zt2/start-soft.bat
windows7-x64
1ac8zt2/start-soft.bat
windows10-2004-x64
1Analysis
-
max time kernel
94s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 13:58
Behavioral task
behavioral1
Sample
ac8zt2/di.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ac8zt2/di.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
ac8zt2/driverpp.sys
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
ac8zt2/driverpp.sys
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
ac8zt2/iedrives.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
ac8zt2/iedrives.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
ac8zt2/install.bat
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
ac8zt2/install.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
ac8zt2/install2.bat
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
ac8zt2/install2.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
ac8zt2/msdrv.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
ac8zt2/msdrv.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
ac8zt2/msdrvctrl.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
ac8zt2/msdrvctrl.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
ac8zt2/start-soft.bat
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
ac8zt2/start-soft.bat
Resource
win10v2004-20240910-en
General
-
Target
ac8zt2/install.bat
-
Size
304B
-
MD5
3a80487df38d375da59fce122961b561
-
SHA1
d61f2ef16b8cf8ccdceaf5a0078108b8634faa8a
-
SHA256
243930c9a6eb6369057d681f6fb32374d7dcb46b2bafae4b638e84bfb1a023a8
-
SHA512
b90329a1cd816a57a28faaae473b1e9d7b03af780575967b715f4b35bc5817f58dcb84968aaa73b375b302e638c2b974f5b1e173a033a43084559e45f760e477
Malware Config
Signatures
-
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\system32\msdrives\msdrvctrl.exe cmd.exe File opened for modification C:\Windows\system32\msdrives\msdrvctrl.exe cmd.exe File created C:\Windows\system32\msdrives\driverpp.sys cmd.exe File opened for modification C:\Windows\system32\msdrives\driverpp.sys cmd.exe File created C:\Windows\system32\msdrives\iedrives.dll cmd.exe File opened for modification C:\Windows\system32\msdrives\iedrives.dll cmd.exe File created C:\Windows\system32\msdrives\msdrv.EXE cmd.exe File opened for modification C:\Windows\system32\msdrives\msdrv.EXE cmd.exe -
resource yara_rule behavioral8/memory/404-8-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral8/memory/404-9-0x0000000000400000-0x000000000040F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language di.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4744 wrote to memory of 404 4744 cmd.exe 83 PID 4744 wrote to memory of 404 4744 cmd.exe 83 PID 4744 wrote to memory of 404 4744 cmd.exe 83
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ac8zt2\install.bat"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\ac8zt2\di.exedi.exe C:\Windows\system32\msdrives\driverpp.sys2⤵
- System Location Discovery: System Language Discovery
PID:404
-