Analysis
-
max time kernel
151s -
max time network
96s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 16:21
Static task
static1
Behavioral task
behavioral1
Sample
d8f76656bb977284e56918858e8b8bc0b4f9d968373150f140e75ddb12e0e85c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d8f76656bb977284e56918858e8b8bc0b4f9d968373150f140e75ddb12e0e85c.exe
Resource
win10v2004-20220901-en
General
-
Target
d8f76656bb977284e56918858e8b8bc0b4f9d968373150f140e75ddb12e0e85c.exe
-
Size
204KB
-
MD5
385de5f4929f440ed449b4a09e8a5064
-
SHA1
090319e4dbd7cea4b818b9a44897f65d94c0fed1
-
SHA256
d8f76656bb977284e56918858e8b8bc0b4f9d968373150f140e75ddb12e0e85c
-
SHA512
427fc94dd692ba7b587e11721845725bd75b28721f792f4fe1cee921d43d5d86032bc897114a4246804fc80f3649f8bcee8b52a49ea73e9c9a280a849e9f2a65
-
SSDEEP
3072:XmsW8Obv0tQ9nLHbB9W0c1TqECzR/mkSYGrl9ymgYUWVXI:WhnD4QxL7B9W0c1RCzR/fSmluY
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zeuwieb.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" d8f76656bb977284e56918858e8b8bc0b4f9d968373150f140e75ddb12e0e85c.exe -
Executes dropped EXE 1 IoCs
pid Process 1940 zeuwieb.exe -
Loads dropped DLL 2 IoCs
pid Process 1408 d8f76656bb977284e56918858e8b8bc0b4f9d968373150f140e75ddb12e0e85c.exe 1408 d8f76656bb977284e56918858e8b8bc0b4f9d968373150f140e75ddb12e0e85c.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /t" zeuwieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /a" zeuwieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /h" zeuwieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /p" zeuwieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /x" zeuwieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /w" zeuwieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /b" zeuwieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /k" zeuwieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /m" zeuwieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /n" zeuwieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /q" zeuwieb.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ zeuwieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /d" zeuwieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /s" zeuwieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /v" zeuwieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /g" zeuwieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /u" zeuwieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /r" zeuwieb.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ d8f76656bb977284e56918858e8b8bc0b4f9d968373150f140e75ddb12e0e85c.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /e" zeuwieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /f" zeuwieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /c" zeuwieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /o" zeuwieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /i" zeuwieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /y" zeuwieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /j" zeuwieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /o" d8f76656bb977284e56918858e8b8bc0b4f9d968373150f140e75ddb12e0e85c.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /l" zeuwieb.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeuwieb = "C:\\Users\\Admin\\zeuwieb.exe /z" zeuwieb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1408 d8f76656bb977284e56918858e8b8bc0b4f9d968373150f140e75ddb12e0e85c.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe 1940 zeuwieb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1408 d8f76656bb977284e56918858e8b8bc0b4f9d968373150f140e75ddb12e0e85c.exe 1940 zeuwieb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1408 wrote to memory of 1940 1408 d8f76656bb977284e56918858e8b8bc0b4f9d968373150f140e75ddb12e0e85c.exe 26 PID 1408 wrote to memory of 1940 1408 d8f76656bb977284e56918858e8b8bc0b4f9d968373150f140e75ddb12e0e85c.exe 26 PID 1408 wrote to memory of 1940 1408 d8f76656bb977284e56918858e8b8bc0b4f9d968373150f140e75ddb12e0e85c.exe 26 PID 1408 wrote to memory of 1940 1408 d8f76656bb977284e56918858e8b8bc0b4f9d968373150f140e75ddb12e0e85c.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8f76656bb977284e56918858e8b8bc0b4f9d968373150f140e75ddb12e0e85c.exe"C:\Users\Admin\AppData\Local\Temp\d8f76656bb977284e56918858e8b8bc0b4f9d968373150f140e75ddb12e0e85c.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\zeuwieb.exe"C:\Users\Admin\zeuwieb.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1940
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD599b82c561a98083e862868f3ab5d28a6
SHA1c9b2d682edf4c12868d718317dff83ebd4dfc55a
SHA256ced4c058900977aaf9f1dab88e56fe8cc2063f5af868547c2d18235cd64961a1
SHA51275353decc1a6f94ab9d21d3c6429bb7c5ab6bce8f3e95562ecef8d76b2e61eb39df7e50332938e7004783473df5839bf69ea2b8f095ff419065429989a461ece
-
Filesize
204KB
MD599b82c561a98083e862868f3ab5d28a6
SHA1c9b2d682edf4c12868d718317dff83ebd4dfc55a
SHA256ced4c058900977aaf9f1dab88e56fe8cc2063f5af868547c2d18235cd64961a1
SHA51275353decc1a6f94ab9d21d3c6429bb7c5ab6bce8f3e95562ecef8d76b2e61eb39df7e50332938e7004783473df5839bf69ea2b8f095ff419065429989a461ece
-
Filesize
204KB
MD599b82c561a98083e862868f3ab5d28a6
SHA1c9b2d682edf4c12868d718317dff83ebd4dfc55a
SHA256ced4c058900977aaf9f1dab88e56fe8cc2063f5af868547c2d18235cd64961a1
SHA51275353decc1a6f94ab9d21d3c6429bb7c5ab6bce8f3e95562ecef8d76b2e61eb39df7e50332938e7004783473df5839bf69ea2b8f095ff419065429989a461ece
-
Filesize
204KB
MD599b82c561a98083e862868f3ab5d28a6
SHA1c9b2d682edf4c12868d718317dff83ebd4dfc55a
SHA256ced4c058900977aaf9f1dab88e56fe8cc2063f5af868547c2d18235cd64961a1
SHA51275353decc1a6f94ab9d21d3c6429bb7c5ab6bce8f3e95562ecef8d76b2e61eb39df7e50332938e7004783473df5839bf69ea2b8f095ff419065429989a461ece