Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 06:27

General

  • Target

    8f6042ed4a3b4e3e4cad79c827ff623e53e45ecca869ae091394bbc858f8560e.exe

  • Size

    324KB

  • MD5

    6cfbeb58d6ffb6805f1fbf70ab3b6d80

  • SHA1

    9de0c495097f1c5fb06db9b8f0f44c42b2b0611c

  • SHA256

    8f6042ed4a3b4e3e4cad79c827ff623e53e45ecca869ae091394bbc858f8560e

  • SHA512

    ab59349e724a6028ed64b5232a5dbdedff13dce993473c6699a87eb3f037dc8d79f748da1b50e97e16746ca75852f6f33f19b3356098dd1e9a2702025c735d5d

  • SSDEEP

    6144:tqsKDJlGM/DPWAiKz28tnQToBgnDMMM0U:tDKDJlGM/7AT8GTMMM0U

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f6042ed4a3b4e3e4cad79c827ff623e53e45ecca869ae091394bbc858f8560e.exe
    "C:\Users\Admin\AppData\Local\Temp\8f6042ed4a3b4e3e4cad79c827ff623e53e45ecca869ae091394bbc858f8560e.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3728
    • C:\Users\Admin\zueoniz.exe
      "C:\Users\Admin\zueoniz.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3408

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\zueoniz.exe

          Filesize

          324KB

          MD5

          55844b55adc1a3f6bcdd19a178d0ab83

          SHA1

          16960e183db42e82dfc7b7d96d05501956b4a8a6

          SHA256

          d897beb89b3d919f803e900b687630e4c3604b184006eeeeedc3ab1a11cb0df2

          SHA512

          eb58fba20f8ed6f2bf461be6a38c84e6c86ef8195784194e7ee648b40a548a34d33e9f407681d8c59c1dc9c30fb171a919a44e212a90e81211388a137e07f30f

        • C:\Users\Admin\zueoniz.exe

          Filesize

          324KB

          MD5

          55844b55adc1a3f6bcdd19a178d0ab83

          SHA1

          16960e183db42e82dfc7b7d96d05501956b4a8a6

          SHA256

          d897beb89b3d919f803e900b687630e4c3604b184006eeeeedc3ab1a11cb0df2

          SHA512

          eb58fba20f8ed6f2bf461be6a38c84e6c86ef8195784194e7ee648b40a548a34d33e9f407681d8c59c1dc9c30fb171a919a44e212a90e81211388a137e07f30f