Analysis

  • max time kernel
    151s
  • max time network
    53s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 07:36

General

  • Target

    ce25c2ac4cdc22b6af950875ffe4577c4718f4184e3fd32b6519f731fb551b85.exe

  • Size

    140KB

  • MD5

    dcdb347998d59303b684183d3bbb84ff

  • SHA1

    a9b3a79c094e4e9b2ece793a90e5f04a01173a28

  • SHA256

    ce25c2ac4cdc22b6af950875ffe4577c4718f4184e3fd32b6519f731fb551b85

  • SHA512

    80ffd34e3b79781ce693e6098da31a2d4558bd354f81a118d2ed0f7333e241b7dcf5b8ba2afaca98958661922b3d2e78d634998154929fcf0a939c84837f6cd9

  • SSDEEP

    3072:svB8Zv7777777777777777Y7777777777777777777dntPnYy11KM6gU:sS0PnYuig

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce25c2ac4cdc22b6af950875ffe4577c4718f4184e3fd32b6519f731fb551b85.exe
    "C:\Users\Admin\AppData\Local\Temp\ce25c2ac4cdc22b6af950875ffe4577c4718f4184e3fd32b6519f731fb551b85.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\Users\Admin\zzton.exe
      "C:\Users\Admin\zzton.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1352

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\zzton.exe

    Filesize

    140KB

    MD5

    821cf588976ca5da14122ab9cb891a05

    SHA1

    1a9708aa126fc999a2f8619de7f8780791162678

    SHA256

    cb35b492af434a09a87adef72ffe959ee350545322ed66f1280a9321a988cf7d

    SHA512

    9d09b9872586950e576debf2f8ad4025a37f46d40a2eebe6f0eba2f9b2b6fb0b7e99d2dd1def9d34030a485fcc2883638da8afafafd32db3a624d5dce3ee44be

  • C:\Users\Admin\zzton.exe

    Filesize

    140KB

    MD5

    821cf588976ca5da14122ab9cb891a05

    SHA1

    1a9708aa126fc999a2f8619de7f8780791162678

    SHA256

    cb35b492af434a09a87adef72ffe959ee350545322ed66f1280a9321a988cf7d

    SHA512

    9d09b9872586950e576debf2f8ad4025a37f46d40a2eebe6f0eba2f9b2b6fb0b7e99d2dd1def9d34030a485fcc2883638da8afafafd32db3a624d5dce3ee44be

  • \Users\Admin\zzton.exe

    Filesize

    140KB

    MD5

    821cf588976ca5da14122ab9cb891a05

    SHA1

    1a9708aa126fc999a2f8619de7f8780791162678

    SHA256

    cb35b492af434a09a87adef72ffe959ee350545322ed66f1280a9321a988cf7d

    SHA512

    9d09b9872586950e576debf2f8ad4025a37f46d40a2eebe6f0eba2f9b2b6fb0b7e99d2dd1def9d34030a485fcc2883638da8afafafd32db3a624d5dce3ee44be

  • \Users\Admin\zzton.exe

    Filesize

    140KB

    MD5

    821cf588976ca5da14122ab9cb891a05

    SHA1

    1a9708aa126fc999a2f8619de7f8780791162678

    SHA256

    cb35b492af434a09a87adef72ffe959ee350545322ed66f1280a9321a988cf7d

    SHA512

    9d09b9872586950e576debf2f8ad4025a37f46d40a2eebe6f0eba2f9b2b6fb0b7e99d2dd1def9d34030a485fcc2883638da8afafafd32db3a624d5dce3ee44be

  • memory/1288-56-0x0000000075FE1000-0x0000000075FE3000-memory.dmp

    Filesize

    8KB