Analysis
-
max time kernel
150s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
b7f1ec5291b499b70bfc22672f9625e31ac6644d5c9829dabff4a555ee64f1e9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b7f1ec5291b499b70bfc22672f9625e31ac6644d5c9829dabff4a555ee64f1e9.exe
Resource
win10v2004-20220901-en
General
-
Target
b7f1ec5291b499b70bfc22672f9625e31ac6644d5c9829dabff4a555ee64f1e9.exe
-
Size
240KB
-
MD5
a0b76f1419e7aba08d85c5b870e32ed2
-
SHA1
6c92a94013312459de35b38ab41fd97f9156c904
-
SHA256
b7f1ec5291b499b70bfc22672f9625e31ac6644d5c9829dabff4a555ee64f1e9
-
SHA512
f47374e7be79188b07c5bdfc543675a4c19515f6c6856e3ee00fcd853595e29216d9b27f6c5662f2cd8fb4129105b60846f241d7fa67b4fdf7cb41b31713684f
-
SSDEEP
6144:uUtW3dwqsNwemAB0EqxF6snji81RUinKchhytS3b:4dQQJsUL
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b7f1ec5291b499b70bfc22672f9625e31ac6644d5c9829dabff4a555ee64f1e9.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zeofaev.exe -
Executes dropped EXE 1 IoCs
pid Process 872 zeofaev.exe -
Loads dropped DLL 2 IoCs
pid Process 1600 b7f1ec5291b499b70bfc22672f9625e31ac6644d5c9829dabff4a555ee64f1e9.exe 1600 b7f1ec5291b499b70bfc22672f9625e31ac6644d5c9829dabff4a555ee64f1e9.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /i" zeofaev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /y" zeofaev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /c" zeofaev.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ b7f1ec5291b499b70bfc22672f9625e31ac6644d5c9829dabff4a555ee64f1e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /d" zeofaev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /h" zeofaev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /m" zeofaev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /k" zeofaev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /u" zeofaev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /b" zeofaev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /f" zeofaev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /z" zeofaev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /l" zeofaev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /h" b7f1ec5291b499b70bfc22672f9625e31ac6644d5c9829dabff4a555ee64f1e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /q" zeofaev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /s" zeofaev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /a" zeofaev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /o" zeofaev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /x" zeofaev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /w" zeofaev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /r" zeofaev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /p" zeofaev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /g" zeofaev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /t" zeofaev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /e" zeofaev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /n" zeofaev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /v" zeofaev.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ zeofaev.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeofaev = "C:\\Users\\Admin\\zeofaev.exe /j" zeofaev.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1600 b7f1ec5291b499b70bfc22672f9625e31ac6644d5c9829dabff4a555ee64f1e9.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe 872 zeofaev.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1600 b7f1ec5291b499b70bfc22672f9625e31ac6644d5c9829dabff4a555ee64f1e9.exe 872 zeofaev.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1600 wrote to memory of 872 1600 b7f1ec5291b499b70bfc22672f9625e31ac6644d5c9829dabff4a555ee64f1e9.exe 27 PID 1600 wrote to memory of 872 1600 b7f1ec5291b499b70bfc22672f9625e31ac6644d5c9829dabff4a555ee64f1e9.exe 27 PID 1600 wrote to memory of 872 1600 b7f1ec5291b499b70bfc22672f9625e31ac6644d5c9829dabff4a555ee64f1e9.exe 27 PID 1600 wrote to memory of 872 1600 b7f1ec5291b499b70bfc22672f9625e31ac6644d5c9829dabff4a555ee64f1e9.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7f1ec5291b499b70bfc22672f9625e31ac6644d5c9829dabff4a555ee64f1e9.exe"C:\Users\Admin\AppData\Local\Temp\b7f1ec5291b499b70bfc22672f9625e31ac6644d5c9829dabff4a555ee64f1e9.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\zeofaev.exe"C:\Users\Admin\zeofaev.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:872
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5261c1fa38d0b34eb188417fc38f84fae
SHA170db5e1216c913d4a308ae8ce4ef45321a9a30e3
SHA2567010ac18cf9f6b047e2148ee92e30aa7fd0709fe4b2a2be9f422ec148f21bc7e
SHA51281947a447529c6450c3f3d42fa3a8d33adcd70c0f0c5520f4f2166b5ed1f7a07be3d6334c132f90a3913026e8466062b33bd72a6bbdeff7379437dfe3253a62f
-
Filesize
240KB
MD5261c1fa38d0b34eb188417fc38f84fae
SHA170db5e1216c913d4a308ae8ce4ef45321a9a30e3
SHA2567010ac18cf9f6b047e2148ee92e30aa7fd0709fe4b2a2be9f422ec148f21bc7e
SHA51281947a447529c6450c3f3d42fa3a8d33adcd70c0f0c5520f4f2166b5ed1f7a07be3d6334c132f90a3913026e8466062b33bd72a6bbdeff7379437dfe3253a62f
-
Filesize
240KB
MD5261c1fa38d0b34eb188417fc38f84fae
SHA170db5e1216c913d4a308ae8ce4ef45321a9a30e3
SHA2567010ac18cf9f6b047e2148ee92e30aa7fd0709fe4b2a2be9f422ec148f21bc7e
SHA51281947a447529c6450c3f3d42fa3a8d33adcd70c0f0c5520f4f2166b5ed1f7a07be3d6334c132f90a3913026e8466062b33bd72a6bbdeff7379437dfe3253a62f
-
Filesize
240KB
MD5261c1fa38d0b34eb188417fc38f84fae
SHA170db5e1216c913d4a308ae8ce4ef45321a9a30e3
SHA2567010ac18cf9f6b047e2148ee92e30aa7fd0709fe4b2a2be9f422ec148f21bc7e
SHA51281947a447529c6450c3f3d42fa3a8d33adcd70c0f0c5520f4f2166b5ed1f7a07be3d6334c132f90a3913026e8466062b33bd72a6bbdeff7379437dfe3253a62f