Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 20:35
Static task
static1
Behavioral task
behavioral1
Sample
2d8985d569c4fc9bb40cc60adf6ba106bd4dd47a7bb2665cf84c494facadc09d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2d8985d569c4fc9bb40cc60adf6ba106bd4dd47a7bb2665cf84c494facadc09d.exe
Resource
win10v2004-20220812-en
General
-
Target
2d8985d569c4fc9bb40cc60adf6ba106bd4dd47a7bb2665cf84c494facadc09d.exe
-
Size
196KB
-
MD5
0eb435b70cbc93318465f746fdf0d7d0
-
SHA1
2f10b0e714a5147f113e80d65aa1d54a1e254bb1
-
SHA256
2d8985d569c4fc9bb40cc60adf6ba106bd4dd47a7bb2665cf84c494facadc09d
-
SHA512
4fcf1cdefe85dec6e1e1d57a23439fc9a92378bddf99a31abd1c1359e9ddc7a86bb4baa836143cb0468cad0a5033bbba3a8aba461f81ccdc171a945c3eb6fd6d
-
SSDEEP
3072:A73e3eqCLAVBZzPdWTSuhUmkbc6CSRv/vTFCY3LAyGEuYa9FK4:5CLGPdWTSuhULbc6CSRvXTFFc3EyI4
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 2d8985d569c4fc9bb40cc60adf6ba106bd4dd47a7bb2665cf84c494facadc09d.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zeipeed.exe -
Executes dropped EXE 1 IoCs
pid Process 2028 zeipeed.exe -
Loads dropped DLL 2 IoCs
pid Process 576 2d8985d569c4fc9bb40cc60adf6ba106bd4dd47a7bb2665cf84c494facadc09d.exe 576 2d8985d569c4fc9bb40cc60adf6ba106bd4dd47a7bb2665cf84c494facadc09d.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /x" zeipeed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /f" zeipeed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /h" zeipeed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /n" 2d8985d569c4fc9bb40cc60adf6ba106bd4dd47a7bb2665cf84c494facadc09d.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /s" zeipeed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /y" zeipeed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /p" zeipeed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /u" zeipeed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /r" zeipeed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /d" zeipeed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /g" zeipeed.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 2d8985d569c4fc9bb40cc60adf6ba106bd4dd47a7bb2665cf84c494facadc09d.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /k" zeipeed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /e" zeipeed.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ zeipeed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /b" zeipeed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /o" zeipeed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /v" zeipeed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /z" zeipeed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /j" zeipeed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /c" zeipeed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /w" zeipeed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /n" zeipeed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /q" zeipeed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /m" zeipeed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /a" zeipeed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /i" zeipeed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /t" zeipeed.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeipeed = "C:\\Users\\Admin\\zeipeed.exe /l" zeipeed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 576 2d8985d569c4fc9bb40cc60adf6ba106bd4dd47a7bb2665cf84c494facadc09d.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe 2028 zeipeed.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 576 2d8985d569c4fc9bb40cc60adf6ba106bd4dd47a7bb2665cf84c494facadc09d.exe 2028 zeipeed.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 576 wrote to memory of 2028 576 2d8985d569c4fc9bb40cc60adf6ba106bd4dd47a7bb2665cf84c494facadc09d.exe 26 PID 576 wrote to memory of 2028 576 2d8985d569c4fc9bb40cc60adf6ba106bd4dd47a7bb2665cf84c494facadc09d.exe 26 PID 576 wrote to memory of 2028 576 2d8985d569c4fc9bb40cc60adf6ba106bd4dd47a7bb2665cf84c494facadc09d.exe 26 PID 576 wrote to memory of 2028 576 2d8985d569c4fc9bb40cc60adf6ba106bd4dd47a7bb2665cf84c494facadc09d.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d8985d569c4fc9bb40cc60adf6ba106bd4dd47a7bb2665cf84c494facadc09d.exe"C:\Users\Admin\AppData\Local\Temp\2d8985d569c4fc9bb40cc60adf6ba106bd4dd47a7bb2665cf84c494facadc09d.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\zeipeed.exe"C:\Users\Admin\zeipeed.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2028
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD5bcd21116597b863b3c8f64aaf3d66a24
SHA14b95476b74f81800721ea67ddd0670f7cf47eb5b
SHA256eec6691ba6bebceaada712fdf1cfbde764719e33e18c1207fde907a41b6f7a8a
SHA512a10f44a6c28c0b3c85e7c06eddab857de353613e4f93a73d210e788d3d9b6d0538274e7fcc743cee84ad0b203c388e4ece6790045619b68dde843e3ba294eb0b
-
Filesize
196KB
MD5bcd21116597b863b3c8f64aaf3d66a24
SHA14b95476b74f81800721ea67ddd0670f7cf47eb5b
SHA256eec6691ba6bebceaada712fdf1cfbde764719e33e18c1207fde907a41b6f7a8a
SHA512a10f44a6c28c0b3c85e7c06eddab857de353613e4f93a73d210e788d3d9b6d0538274e7fcc743cee84ad0b203c388e4ece6790045619b68dde843e3ba294eb0b
-
Filesize
196KB
MD5bcd21116597b863b3c8f64aaf3d66a24
SHA14b95476b74f81800721ea67ddd0670f7cf47eb5b
SHA256eec6691ba6bebceaada712fdf1cfbde764719e33e18c1207fde907a41b6f7a8a
SHA512a10f44a6c28c0b3c85e7c06eddab857de353613e4f93a73d210e788d3d9b6d0538274e7fcc743cee84ad0b203c388e4ece6790045619b68dde843e3ba294eb0b
-
Filesize
196KB
MD5bcd21116597b863b3c8f64aaf3d66a24
SHA14b95476b74f81800721ea67ddd0670f7cf47eb5b
SHA256eec6691ba6bebceaada712fdf1cfbde764719e33e18c1207fde907a41b6f7a8a
SHA512a10f44a6c28c0b3c85e7c06eddab857de353613e4f93a73d210e788d3d9b6d0538274e7fcc743cee84ad0b203c388e4ece6790045619b68dde843e3ba294eb0b