Analysis

  • max time kernel
    180s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 16:49

General

  • Target

    52d2d918ce312ea8f821c2f154cbb45c9ba79998029a9d314bcfd45360e019b9.exe

  • Size

    248KB

  • MD5

    172bdec9e6c7a8144a824db7cf0cd1ca

  • SHA1

    3cfafe4d7aeb3886e75612204d721ff93bf3425a

  • SHA256

    52d2d918ce312ea8f821c2f154cbb45c9ba79998029a9d314bcfd45360e019b9

  • SHA512

    6459688cc80800aa03efa6cf2103701c65d26ce7f200b8abf92f60ae446a6f5b9a017adb0b55c217736f4806c30ee61694d615c8d41bed7b1b546ce2da869b33

  • SSDEEP

    6144:aUM5CElofkFWQPtnRneqAKnvmb7/D269fgwMty0e6ndv0DyV8Q:aj5CLkFfnRnWKnvmb7/D26qndv0Dk

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52d2d918ce312ea8f821c2f154cbb45c9ba79998029a9d314bcfd45360e019b9.exe
    "C:\Users\Admin\AppData\Local\Temp\52d2d918ce312ea8f821c2f154cbb45c9ba79998029a9d314bcfd45360e019b9.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4860
    • C:\Users\Admin\zajoz.exe
      "C:\Users\Admin\zajoz.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3616

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\zajoz.exe

    Filesize

    248KB

    MD5

    891f5d5960fba0ff57acb37977c2fde7

    SHA1

    79e167dd35a9e54ce805365b8186e9d531a37aac

    SHA256

    ab954007b50c1ca6602f6985e919e5f929b8de978e33f4ee60f5492078181dea

    SHA512

    082e111fcfe617cdeb84b6b5abac905a894b56f68aefa2a3253daaa1e321ba1b183410ca55631c302795c92d25ac5519f00263b2df1dc33e474e03a7c679be2a

  • C:\Users\Admin\zajoz.exe

    Filesize

    248KB

    MD5

    891f5d5960fba0ff57acb37977c2fde7

    SHA1

    79e167dd35a9e54ce805365b8186e9d531a37aac

    SHA256

    ab954007b50c1ca6602f6985e919e5f929b8de978e33f4ee60f5492078181dea

    SHA512

    082e111fcfe617cdeb84b6b5abac905a894b56f68aefa2a3253daaa1e321ba1b183410ca55631c302795c92d25ac5519f00263b2df1dc33e474e03a7c679be2a

  • memory/3616-134-0x0000000000000000-mapping.dmp