Analysis
-
max time kernel
42s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
12/10/2022, 17:32
Static task
static1
Behavioral task
behavioral1
Sample
b8a0b7500374df04704155ebd39c263aef17b5efeb8d65e38b0719d0492b0c48.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b8a0b7500374df04704155ebd39c263aef17b5efeb8d65e38b0719d0492b0c48.exe
Resource
win10v2004-20220901-en
General
-
Target
b8a0b7500374df04704155ebd39c263aef17b5efeb8d65e38b0719d0492b0c48.exe
-
Size
104KB
-
MD5
7b925a88d2d04f5dc7d58fe458a8736d
-
SHA1
6b83e61b17ab0c25c702a5165b6ed3ff26b0d73a
-
SHA256
b8a0b7500374df04704155ebd39c263aef17b5efeb8d65e38b0719d0492b0c48
-
SHA512
26cccae5660e77b56f3d23c4f5a883158132244c02cd4522984876b399c762b736d8e8d3a3de8dc3836423fac1baefca44a244c5aa734faf312ecbab2ea1e661
-
SSDEEP
1536:h3gxGx3PtbkuOL5vLJWnYlrbPMPXvPWPRPpPLCOzSo4BszKhyMee+FWMktOOqw9F:5gxQdErlLCO14BiKhyMN+FPLQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 840 zfjaof.exe -
Loads dropped DLL 2 IoCs
pid Process 1272 b8a0b7500374df04704155ebd39c263aef17b5efeb8d65e38b0719d0492b0c48.exe 1272 b8a0b7500374df04704155ebd39c263aef17b5efeb8d65e38b0719d0492b0c48.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1272 b8a0b7500374df04704155ebd39c263aef17b5efeb8d65e38b0719d0492b0c48.exe 840 zfjaof.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1272 wrote to memory of 840 1272 b8a0b7500374df04704155ebd39c263aef17b5efeb8d65e38b0719d0492b0c48.exe 27 PID 1272 wrote to memory of 840 1272 b8a0b7500374df04704155ebd39c263aef17b5efeb8d65e38b0719d0492b0c48.exe 27 PID 1272 wrote to memory of 840 1272 b8a0b7500374df04704155ebd39c263aef17b5efeb8d65e38b0719d0492b0c48.exe 27 PID 1272 wrote to memory of 840 1272 b8a0b7500374df04704155ebd39c263aef17b5efeb8d65e38b0719d0492b0c48.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8a0b7500374df04704155ebd39c263aef17b5efeb8d65e38b0719d0492b0c48.exe"C:\Users\Admin\AppData\Local\Temp\b8a0b7500374df04704155ebd39c263aef17b5efeb8d65e38b0719d0492b0c48.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\zfjaof.exe"C:\Users\Admin\zfjaof.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:840
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD54686bd22e435ba0d7730a0780174049b
SHA110d023d763da79cf23cc2a985dcaf5da1baec9c8
SHA25660d924438c04fcb381ea50f17dbb7ef5757166c981b1a3127cd87f17a051d09c
SHA512003a32748e751165a0853b68dd81db39585f692b2bbe8ce714e84c3fc575377b8c7d0f856444f4678c1b69ba65d601c61ba532063feaf451cbe086b4ba422db2
-
Filesize
104KB
MD54686bd22e435ba0d7730a0780174049b
SHA110d023d763da79cf23cc2a985dcaf5da1baec9c8
SHA25660d924438c04fcb381ea50f17dbb7ef5757166c981b1a3127cd87f17a051d09c
SHA512003a32748e751165a0853b68dd81db39585f692b2bbe8ce714e84c3fc575377b8c7d0f856444f4678c1b69ba65d601c61ba532063feaf451cbe086b4ba422db2
-
Filesize
104KB
MD54686bd22e435ba0d7730a0780174049b
SHA110d023d763da79cf23cc2a985dcaf5da1baec9c8
SHA25660d924438c04fcb381ea50f17dbb7ef5757166c981b1a3127cd87f17a051d09c
SHA512003a32748e751165a0853b68dd81db39585f692b2bbe8ce714e84c3fc575377b8c7d0f856444f4678c1b69ba65d601c61ba532063feaf451cbe086b4ba422db2
-
Filesize
104KB
MD54686bd22e435ba0d7730a0780174049b
SHA110d023d763da79cf23cc2a985dcaf5da1baec9c8
SHA25660d924438c04fcb381ea50f17dbb7ef5757166c981b1a3127cd87f17a051d09c
SHA512003a32748e751165a0853b68dd81db39585f692b2bbe8ce714e84c3fc575377b8c7d0f856444f4678c1b69ba65d601c61ba532063feaf451cbe086b4ba422db2