Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 13:15
Static task
static1
Behavioral task
behavioral1
Sample
19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe
Resource
win10v2004-20220812-en
General
-
Target
19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe
-
Size
312KB
-
MD5
91ba4685c8ae3d4827600b94a1f8d751
-
SHA1
bb85a5e22f883820bbde486b2072c9741478b396
-
SHA256
19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471
-
SHA512
ed21f534304aa9d14d4dbc350ee130a6e3e400237838b6a9922a3b379f2e405913c6709328fbced5ac7578bba677866cd0436a1e0bc0a670fd3e48ee6a1452ab
-
SSDEEP
6144:hZXePGG+XgYIlqAnIVDC8e5uMSXGJZPBP3Jm908q:KX+XgYMNIVa5uM1D/U08
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wdzaav.exe -
Executes dropped EXE 1 IoCs
pid Process 1112 wdzaav.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /J" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /G" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /g" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /x" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /M" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /A" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /D" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /i" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /e" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /P" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /q" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /y" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /W" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /S" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /n" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /N" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /v" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /T" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /d" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /l" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /f" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /H" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /R" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /b" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /Z" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /Q" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /F" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /w" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /c" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /U" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /o" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /m" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /z" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /p" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /s" wdzaav.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /B" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /K" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /C" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /h" wdzaav.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /h" 19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /I" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /r" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /t" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /Y" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /X" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /L" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /V" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /j" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /u" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /k" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /E" wdzaav.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdzaav = "C:\\Users\\Admin\\wdzaav.exe /O" wdzaav.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2036 19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe 2036 19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe 1112 wdzaav.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2036 19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe 1112 wdzaav.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1112 2036 19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe 83 PID 2036 wrote to memory of 1112 2036 19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe 83 PID 2036 wrote to memory of 1112 2036 19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe"C:\Users\Admin\AppData\Local\Temp\19205f8e908d8c1f36b6efb21292961af195e767125b9cf9017aa2e6f5030471.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\wdzaav.exe"C:\Users\Admin\wdzaav.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1112
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD5ac71134e79e876bc1d8541c509a2310e
SHA1ee44ac223cdec0509c1eeaa024e1a46a58efc535
SHA256aabad554c573a2028a4fc9f2e7e3463cbfa5f4c570d331578441c5e2202752fd
SHA512e0b2d24a2858589515d8373f46c4309623a478197ce70ca6744137de24de96d64eaa8f39748feb69e22963eae4c720c144819ed6de2076914ea5c24f6ca91ca8
-
Filesize
312KB
MD5ac71134e79e876bc1d8541c509a2310e
SHA1ee44ac223cdec0509c1eeaa024e1a46a58efc535
SHA256aabad554c573a2028a4fc9f2e7e3463cbfa5f4c570d331578441c5e2202752fd
SHA512e0b2d24a2858589515d8373f46c4309623a478197ce70ca6744137de24de96d64eaa8f39748feb69e22963eae4c720c144819ed6de2076914ea5c24f6ca91ca8