Analysis

  • max time kernel
    118s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-12-2024 21:25

General

  • Target

    The-MALWARE-Repo-master/Trojan/Zika.exe

  • Size

    5.6MB

  • MD5

    40228458ca455d28e33951a2f3844209

  • SHA1

    86165eb8eb3e99b6efa25426508a323be0e68a44

  • SHA256

    1a904494bb7a21512af6013fe65745e7898cdd6fadac8cb58be04e02346ed95f

  • SHA512

    da62cc244f9924444c7cb4fdbd46017c65e6130d639f6696f7930d867017c211df8b18601bfdaaee65438cee03977848513d7f08987b9b945f3f05241f55ec39

  • SSDEEP

    98304:Xpkr2dY/aBcjJOBHOBIQBajMtWvoJiLE1+XgRKz89G/4ZSb0Funwh6DsN2PIpCr/:Xpkr2dY/aBcjJOBHOBIQBajMtWvoJiLf

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 14 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Trojan\Zika.exe
    "C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Trojan\Zika.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\svchost.exe" -extract C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\icons.rc, icongroup,,
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2104
    • C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\taskhost.exe
      "C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\icons.rc, C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\icons.res
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2820
    • C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\svchost.exe" -extract C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\icons.rc, icongroup,,
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2928
    • C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\taskhost.exe
      "C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\icons.rc, C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\icons.res
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2608
    • C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\svchost.exe" -addoverwrite C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe", "C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe, C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\icons.res, icongroup,,
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2076
    • C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\svchost.exe" -extract C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\icons.rc, icongroup,,
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2020
    • C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\taskhost.exe
      "C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\icons.rc, C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\icons.res
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.dll.sys.exe

    Filesize

    145KB

    MD5

    9d10f99a6712e28f8acd5641e3a7ea6b

    SHA1

    835e982347db919a681ba12f3891f62152e50f0d

    SHA256

    70964a0ed9011ea94044e15fa77edd9cf535cc79ed8e03a3721ff007e69595cc

    SHA512

    2141ee5c07aa3e038360013e3f40969e248bed05022d161b992df61f21934c5574ed9d3094ffd5245f5afd84815b24f80bda30055cf4d374f9c6254e842f6bd5

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.dll.sys.exe

    Filesize

    1.0MB

    MD5

    4d92f518527353c0db88a70fddcfd390

    SHA1

    c4baffc19e7d1f0e0ebf73bab86a491c1d152f98

    SHA256

    97e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c

    SHA512

    05a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe

    Filesize

    6.0MB

    MD5

    b518e9f18b2e503b1ce5ccde4d1d1d02

    SHA1

    f20bb3136e10be4f4475728686688f9d240357c8

    SHA256

    c2bd6ae48d8843be80d7ecedad12bb8249fb0c2faa087981d4403fa1fe132d25

    SHA512

    9eaa08611aef18b4d8c0257a6f574766a700fa958cb4991ef4d006163695c4a14a23ea9bdff6f4c552dd13ed64ed9158817a0e7780d08b7569aeb3da5652f197

  • C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.dll.sys.exe

    Filesize

    507KB

    MD5

    c87e561258f2f8650cef999bf643a731

    SHA1

    2c64b901284908e8ed59cf9c912f17d45b05e0af

    SHA256

    a1dfa6639bef3cb4e41175c43730d46a51393942ead826337ca9541ac210c67b

    SHA512

    dea4833aa712c5823f800f5f5a2adcf241c1b2b6747872f540f5ff9da6795c4ddb73db0912593337083c7c67b91e9eaf1b3d39a34b99980fd5904ba3d7d62f6c

  • C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.exe

    Filesize

    5.6MB

    MD5

    40228458ca455d28e33951a2f3844209

    SHA1

    86165eb8eb3e99b6efa25426508a323be0e68a44

    SHA256

    1a904494bb7a21512af6013fe65745e7898cdd6fadac8cb58be04e02346ed95f

    SHA512

    da62cc244f9924444c7cb4fdbd46017c65e6130d639f6696f7930d867017c211df8b18601bfdaaee65438cee03977848513d7f08987b9b945f3f05241f55ec39

  • C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\Icon_1.ico

    Filesize

    320KB

    MD5

    985756f1f5cf148b6e0c58b115a11fde

    SHA1

    37eb0ccec50bcd318731755b07089f7e4643f81a

    SHA256

    3c9969308f846c5dbd6b14ab206e87972ce489f8ad0da321f3f5f1cb74d17b75

    SHA512

    49556d420f98ba7d0aa58f78650e8571a7b68621ca701513a099ca3598ff820644bc182077fa038e30a4931f515da668e5babeff7d6f773b780c5ecf868720e2

  • C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\icons.rc

    Filesize

    31B

    MD5

    8980f4488757cb808740c28bfbc0ad34

    SHA1

    5d7b7c3b982ed97e17d47ecc82f95c3fb0bc56ca

    SHA256

    d34b789596f17974ebf47695f37f18723b9be1ca14c63bb407616213a5373ea4

    SHA512

    e5ee95f4a78b2220139ee6e8dfbd18bc7d2daf3d6417b43e4772c19295e398fa5297362e99020ec56b960c2b4f671a4d7d5f9cae10e63768f2815f1b9722889d

  • C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\icons.res

    Filesize

    32B

    MD5

    45d02203801ec5cae86ed0a68727b0fa

    SHA1

    1b22a6df3fc0ef23c6c5312c937db7c8c0df6703

    SHA256

    5e743f477333066c29c3742cc8f9f64a8cb9c54b71dbc8c69af5025d31f8c121

    SHA512

    8da0bf59066223aab96595c9fbf8532baa34f1f9c2c0dee674d310a82677b6c7d6a1cc0bbaa75262b986d2b805b049ec3a2bfb25a9ae30fe6d02e32660f15e83

  • C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\icons.res

    Filesize

    48B

    MD5

    187272df1c987fe31251fd060fc2d413

    SHA1

    04a1a6f21f668751b33a19923819a7373372769f

    SHA256

    7d13005c1ce10b42cfe64baf165d6c8dd456a134342c48e7510f4eb11f759e0b

    SHA512

    c53b523c6c6e0e585cca464c998434ed8fecd41a17015bc5222231a93b8160e04b77f7a978c5726d3b225d5299cc3405b30e26a7fa56e23a55434ad3a2b13f6c

  • C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\icons.res

    Filesize

    320KB

    MD5

    6d344fa9922341f5ee496c53a5921db0

    SHA1

    80baacf6821f48fa0ab993bd795b9627aa5bec39

    SHA256

    228878195da2abc76f6ac3b1c7d7113b9c68cb938a540c5551fcab5d5740da7d

    SHA512

    6728e41475f64e6335a25061a760ccd1a74d48cd2556ecc1bd487f20c58dc35f35e57b48886014690fd318ff57253994217c69487ed37c5a5bc5369b90fec82b

  • C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\svchost.ini

    Filesize

    524B

    MD5

    1bf1e924fdb3de3e50a20bc11300c51c

    SHA1

    c6aa951f14dfa7c8a6c3d957eff688904994ea7e

    SHA256

    993f02014476c29792ddfa374c72952c3a8df80855c8b2f0f25e928f364eddce

    SHA512

    6b6d95367decef1e80fc91883d1e5f44a71f3d7b74b68ff2ea7cdbacf6fc0805b3d7d9c17d805dece38766d07a17a4276c158b7c441bfa224d46002cf893573a

  • C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\svchost.ini

    Filesize

    607B

    MD5

    e7c9ef6c512d42c7cb7ee0f05152918f

    SHA1

    6527cf2a4eb5b1951c4a8b4effed88981632f34a

    SHA256

    e74a0bd9e524acbdc23ee44a4103be17fb022d3b3dfc9aeaf96f8f7e3e36118b

    SHA512

    ddd9d7f4b3b2e3699785990bb4c2e9da3d485a8e6001603a27eb086a629ae29bf2c452f21980b5bf3419ac2a7955ddace582f42bf10e428c9819aaa92ee64644

  • C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\svchost.ini

    Filesize

    372B

    MD5

    31bcff9b498d6aed65f306b070028fc2

    SHA1

    96af38ab9f14f77248f9d22f65985db4615542de

    SHA256

    584b018f3404e632af3554a4291aa13411663b07355a09ba7e61f3cab61fa425

    SHA512

    b869a9e09445ba0c557350a75e063b0bcfcfa1f28c0712366ff940373054b9be8be639e024504733f0c0889abb7b1d28aa408dfe5ed711f58e7f626c8d0dd8fd

  • C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\svchost.ini

    Filesize

    452B

    MD5

    1f351cb9e79a5ceccc566d86581667f4

    SHA1

    39edc45401a6654444228a335468f2578c87e957

    SHA256

    c1c2e1c7dfdde5427c9458e8741ec4bff38f9d8f283c6f4b84023e4787b5cc46

    SHA512

    c1589a9d7948162903203574f562f1296f4b4adac531506f144fe6786fb28c5f7b46d9ff7fe859a7aff54e182bd7560ad82a6fa34f78fd0e85d37f7555d309ba

  • C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\svchost.log

    Filesize

    290B

    MD5

    9aa12342ad8ff30aa09f8f7c8b5455a3

    SHA1

    02aff7fa56f7ad2da61936a3cbc609f4f6debb78

    SHA256

    d0d64010f669d204a56839372e15896a87b41e26fc0f53522efb8f7bb656c8f6

    SHA512

    b1c834e2221d78c1c8b7049a2a61b3b35efb29391c3f0aafb8578eed956997f17c47cf23a178df2d4e09d7b6c50f220fac44dbc67af6d9992f2bc72cd1e8e4e4

  • C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\svchost.log

    Filesize

    312B

    MD5

    a97ab27981b63e684d3a697ee632bfa1

    SHA1

    232c70345f9f9b24336c0df95fd18534d6f9ad3d

    SHA256

    0c4c73a98eef384bc6870a2f65cfd496d3aa66854aef45f3e5c1b9de5b92d436

    SHA512

    1b63b3dc5ffcd001e3f31d5e5e329730b1eb281c6b484ee9c6907ac55a20bedbe873961561d137449cd28ea4b5b5191bf3ddc294f9558bf078a572e97ec80155

  • C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\svchost.log

    Filesize

    348B

    MD5

    5c0d03da588c4531ff066f70767bd400

    SHA1

    77e226d574e155b178566ef322e3204c8af3cb85

    SHA256

    f01e643f3e9ee9a0dce05fb9b63dcd35214400c018c97c445ca6a37cce1b9a4c

    SHA512

    ec17960265aadd692d89157924c62711e0fdae2c7a679796fe67d6d2286f1c6fa8b29a0f0d187e6bc546c862310dea16661d758a36d8336712c56cc077ddb535

  • C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\svchost.log

    Filesize

    361B

    MD5

    3b84a4ad890073c91f2002ca80f3f410

    SHA1

    1ff5ea6b8a4badf1ad820aef35947c5a36bdf162

    SHA256

    9a9364fcbf7854fd9c78c308812457eb7742c6e17f637050ed25873014cb0182

    SHA512

    f05d45f5e9a5f5055534bc4cd2f9d00dd4d22783721543e3ed23d4b74aaacd11debe885427b07121d41c779c6adce396bf8a985e89ccb602d0d292f6beecceae

  • C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\taskhost.ini

    Filesize

    44B

    MD5

    dbfea325d1e00a904309a682051778ad

    SHA1

    525562934d0866f2ba90b3c25ea005c8c5f1e9fb

    SHA256

    15a3a3303b4a77272ddb04454333a4c06aa2a113f210ba4a03314026e0821e6d

    SHA512

    cd853c67c2b1a44c3f592ff42d207b2251e8b9bc1eb22fc12cd710329069ef75abffccd169418c4f9bd008a40f2fbbfc6904519f27fd658f316309f94b8ff59c

  • C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\taskhost.log

    Filesize

    702B

    MD5

    72ec4fb71056f18880cf355a4d01368c

    SHA1

    fede3210c90b8c97f57ad0280d776d09255ad01d

    SHA256

    45529dff245d44fbc22843e40adf4b8117aff2489dc3b5ab14a6713f71868e8e

    SHA512

    acb74d119f8411541ed9f8baa138764b38c885d342f77767a4c119e86485087ac506e40086e57568f8c79814b2ba72782cb062ed6f87513cb0624d49aa526707

  • C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\taskhost.log

    Filesize

    716B

    MD5

    7620c10826e86db925e6637759c69531

    SHA1

    0e8ca57d7c7b9717ae36c9f317049a21492812a3

    SHA256

    a1d251c587198fc1fd4332826faaa6535fbe78eb9b895ba722024b41b86f9298

    SHA512

    f235c2fa4bb7860c30337f0d4f7fa1bd79a69e0646d105960baffcaa456e0c71f8cf554f91a7caa4a6a84e2a4cce79b856b86cad31538d60e61bae8bfd696701

  • C:\Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\taskhost.log

    Filesize

    702B

    MD5

    04a74f39c8150e10c89e8e5dcf7de6ae

    SHA1

    9240cbd95bbead2d4f9d0d8954618bae9101ef81

    SHA256

    110b01bb1c9603132bc88893696bbcf905b06d690c70d3d9a68a27d03a7e704d

    SHA512

    180f4a955c31f4ade13ddfdd4628712fcb6ea5efc351c212def84fc3362f77fa0660f769716699a7fab307594a72209301139d576b67a2bc7a135eb45ebb77b9

  • \Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\svchost.exe

    Filesize

    861KB

    MD5

    66064dbdb70a5eb15ebf3bf65aba254b

    SHA1

    0284fd320f99f62aca800fb1251eff4c31ec4ed7

    SHA256

    6a94dbda2dd1edcff2331061d65e1baf09d4861cc7ba590c5ec754f3ac96a795

    SHA512

    b05c6c09ae7372c381fba591c3cb13a69a2451b9d38da1a95aac89413d7438083475d06796acb5440cd6ec65b030c9fa6cbdaa0d2fe91a926bae6499c360f17f

  • \Users\Admin\AppData\Local\Temp\d8d414c4a40a4b9e87ffed644c97b1fe\taskhost.exe

    Filesize

    4.1MB

    MD5

    c6391727ae405fb9812a8ad2a7729402

    SHA1

    83693dc297392c6a28f7f16d23414c6d62921711

    SHA256

    d98fbfca17f194400d19111e4813340e6666b254b99f833739b661a4d2d0217c

    SHA512

    7a4e2ff93d853415d433f5e90b36959c78b77590aa1fa00753831eb4d01cb1a972bb9e39eb8dee5b216005e7709eacda51c0c410aacfe37fcdb163603fd36570

  • memory/2020-119-0x0000000000400000-0x00000000004DD000-memory.dmp

    Filesize

    884KB

  • memory/2076-100-0x0000000000400000-0x00000000004DD000-memory.dmp

    Filesize

    884KB

  • memory/2104-28-0x0000000000400000-0x00000000004DD000-memory.dmp

    Filesize

    884KB

  • memory/2104-22-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2512-0-0x00000000748FE000-0x00000000748FF000-memory.dmp

    Filesize

    4KB

  • memory/2512-12-0x00000000748F0000-0x0000000074FDE000-memory.dmp

    Filesize

    6.9MB

  • memory/2512-1-0x0000000000990000-0x0000000000F3C000-memory.dmp

    Filesize

    5.7MB

  • memory/2512-137-0x00000000748F0000-0x0000000074FDE000-memory.dmp

    Filesize

    6.9MB

  • memory/2584-130-0x0000000000400000-0x000000000084A000-memory.dmp

    Filesize

    4.3MB

  • memory/2608-83-0x0000000000400000-0x000000000084A000-memory.dmp

    Filesize

    4.3MB

  • memory/2820-36-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2820-47-0x0000000000400000-0x000000000084A000-memory.dmp

    Filesize

    4.3MB

  • memory/2928-68-0x0000000000400000-0x00000000004DD000-memory.dmp

    Filesize

    884KB