Analysis

  • max time kernel
    154s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 16:33

General

  • Target

    22ca2b6bed8210db67ae326515093b7e266d36f4074866a13c5098043cb6c9ab.exe

  • Size

    276KB

  • MD5

    0cfc1c3eec7816f466f2f87530568f81

  • SHA1

    e95d16dee8dde9ef345f52d351dce285f68ddbf1

  • SHA256

    22ca2b6bed8210db67ae326515093b7e266d36f4074866a13c5098043cb6c9ab

  • SHA512

    783a147a2311e4475d506e97ea21bcf4d676a81a75a1bdfd0fe217e6fb525571f5bde97a15e8621b9d5fa5546c42a85cf6c60b933f965557779d63c22ab03cb6

  • SSDEEP

    3072:IGwXuADtev4IIT+IuGz8jt2LS/ekYeX4CPkuouXLgKE3U23X/JBICjoDDFc+xkwg:DwXuA0v1IbumBLUekY0kuZgKutJBLhHT

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22ca2b6bed8210db67ae326515093b7e266d36f4074866a13c5098043cb6c9ab.exe
    "C:\Users\Admin\AppData\Local\Temp\22ca2b6bed8210db67ae326515093b7e266d36f4074866a13c5098043cb6c9ab.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Users\Admin\zoayie.exe
      "C:\Users\Admin\zoayie.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:5100

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\zoayie.exe

    Filesize

    276KB

    MD5

    cdb20ea60bfbc2a1d0c8380873956734

    SHA1

    9ae10b2e4d30ec5ef320058b27597c045231c12b

    SHA256

    2095e9dd2e5e0691aabc65739e546dc451ffa8caf1ea0202542ff27f130d1812

    SHA512

    85d1c676d0f206bdf3478a7a40e3b981e40706e6999771cf5d05247a8cf21914ab3a9bc7f8e4dcdd57f0e85e9b8fe17568836444d6d53c46c6c9fe6aefe590d8

  • C:\Users\Admin\zoayie.exe

    Filesize

    276KB

    MD5

    cdb20ea60bfbc2a1d0c8380873956734

    SHA1

    9ae10b2e4d30ec5ef320058b27597c045231c12b

    SHA256

    2095e9dd2e5e0691aabc65739e546dc451ffa8caf1ea0202542ff27f130d1812

    SHA512

    85d1c676d0f206bdf3478a7a40e3b981e40706e6999771cf5d05247a8cf21914ab3a9bc7f8e4dcdd57f0e85e9b8fe17568836444d6d53c46c6c9fe6aefe590d8