Analysis
-
max time kernel
151s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 07:36
Static task
static1
Behavioral task
behavioral1
Sample
ce25c2ac4cdc22b6af950875ffe4577c4718f4184e3fd32b6519f731fb551b85.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ce25c2ac4cdc22b6af950875ffe4577c4718f4184e3fd32b6519f731fb551b85.exe
Resource
win10v2004-20220812-en
General
-
Target
ce25c2ac4cdc22b6af950875ffe4577c4718f4184e3fd32b6519f731fb551b85.exe
-
Size
140KB
-
MD5
dcdb347998d59303b684183d3bbb84ff
-
SHA1
a9b3a79c094e4e9b2ece793a90e5f04a01173a28
-
SHA256
ce25c2ac4cdc22b6af950875ffe4577c4718f4184e3fd32b6519f731fb551b85
-
SHA512
80ffd34e3b79781ce693e6098da31a2d4558bd354f81a118d2ed0f7333e241b7dcf5b8ba2afaca98958661922b3d2e78d634998154929fcf0a939c84837f6cd9
-
SSDEEP
3072:svB8Zv7777777777777777Y7777777777777777777dntPnYy11KM6gU:sS0PnYuig
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ce25c2ac4cdc22b6af950875ffe4577c4718f4184e3fd32b6519f731fb551b85.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zzton.exe -
Executes dropped EXE 1 IoCs
pid Process 1352 zzton.exe -
Loads dropped DLL 2 IoCs
pid Process 1288 ce25c2ac4cdc22b6af950875ffe4577c4718f4184e3fd32b6519f731fb551b85.exe 1288 ce25c2ac4cdc22b6af950875ffe4577c4718f4184e3fd32b6519f731fb551b85.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ ce25c2ac4cdc22b6af950875ffe4577c4718f4184e3fd32b6519f731fb551b85.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /a" zzton.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /n" zzton.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /z" zzton.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /h" zzton.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /c" zzton.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /w" zzton.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /j" zzton.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /b" zzton.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /k" zzton.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /l" zzton.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /t" zzton.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /q" zzton.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /u" zzton.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /o" zzton.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /y" zzton.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /p" zzton.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /x" zzton.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ zzton.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /v" zzton.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /d" zzton.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /g" zzton.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /e" zzton.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /d" ce25c2ac4cdc22b6af950875ffe4577c4718f4184e3fd32b6519f731fb551b85.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /m" zzton.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /f" zzton.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /r" zzton.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /s" zzton.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzton = "C:\\Users\\Admin\\zzton.exe /i" zzton.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1288 ce25c2ac4cdc22b6af950875ffe4577c4718f4184e3fd32b6519f731fb551b85.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe 1352 zzton.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1288 ce25c2ac4cdc22b6af950875ffe4577c4718f4184e3fd32b6519f731fb551b85.exe 1288 ce25c2ac4cdc22b6af950875ffe4577c4718f4184e3fd32b6519f731fb551b85.exe 1352 zzton.exe 1352 zzton.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1288 wrote to memory of 1352 1288 ce25c2ac4cdc22b6af950875ffe4577c4718f4184e3fd32b6519f731fb551b85.exe 27 PID 1288 wrote to memory of 1352 1288 ce25c2ac4cdc22b6af950875ffe4577c4718f4184e3fd32b6519f731fb551b85.exe 27 PID 1288 wrote to memory of 1352 1288 ce25c2ac4cdc22b6af950875ffe4577c4718f4184e3fd32b6519f731fb551b85.exe 27 PID 1288 wrote to memory of 1352 1288 ce25c2ac4cdc22b6af950875ffe4577c4718f4184e3fd32b6519f731fb551b85.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce25c2ac4cdc22b6af950875ffe4577c4718f4184e3fd32b6519f731fb551b85.exe"C:\Users\Admin\AppData\Local\Temp\ce25c2ac4cdc22b6af950875ffe4577c4718f4184e3fd32b6519f731fb551b85.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\zzton.exe"C:\Users\Admin\zzton.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1352
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD5821cf588976ca5da14122ab9cb891a05
SHA11a9708aa126fc999a2f8619de7f8780791162678
SHA256cb35b492af434a09a87adef72ffe959ee350545322ed66f1280a9321a988cf7d
SHA5129d09b9872586950e576debf2f8ad4025a37f46d40a2eebe6f0eba2f9b2b6fb0b7e99d2dd1def9d34030a485fcc2883638da8afafafd32db3a624d5dce3ee44be
-
Filesize
140KB
MD5821cf588976ca5da14122ab9cb891a05
SHA11a9708aa126fc999a2f8619de7f8780791162678
SHA256cb35b492af434a09a87adef72ffe959ee350545322ed66f1280a9321a988cf7d
SHA5129d09b9872586950e576debf2f8ad4025a37f46d40a2eebe6f0eba2f9b2b6fb0b7e99d2dd1def9d34030a485fcc2883638da8afafafd32db3a624d5dce3ee44be
-
Filesize
140KB
MD5821cf588976ca5da14122ab9cb891a05
SHA11a9708aa126fc999a2f8619de7f8780791162678
SHA256cb35b492af434a09a87adef72ffe959ee350545322ed66f1280a9321a988cf7d
SHA5129d09b9872586950e576debf2f8ad4025a37f46d40a2eebe6f0eba2f9b2b6fb0b7e99d2dd1def9d34030a485fcc2883638da8afafafd32db3a624d5dce3ee44be
-
Filesize
140KB
MD5821cf588976ca5da14122ab9cb891a05
SHA11a9708aa126fc999a2f8619de7f8780791162678
SHA256cb35b492af434a09a87adef72ffe959ee350545322ed66f1280a9321a988cf7d
SHA5129d09b9872586950e576debf2f8ad4025a37f46d40a2eebe6f0eba2f9b2b6fb0b7e99d2dd1def9d34030a485fcc2883638da8afafafd32db3a624d5dce3ee44be