Analysis

  • max time kernel
    166s
  • max time network
    208s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 17:15

General

  • Target

    082db0fcf214997990a3d0dc3844439f6d98d165b4548bc5c9c56cf88c67b295.exe

  • Size

    180KB

  • MD5

    53718f0746a2f794488e2846cde52690

  • SHA1

    929507f75a18040d3d1467f29a2511bce9a4d7f9

  • SHA256

    082db0fcf214997990a3d0dc3844439f6d98d165b4548bc5c9c56cf88c67b295

  • SHA512

    16ad36f031fa7ed7121d9776ef17a09187be5ef90490183bc357dccc8dd19bc94c87f6c6c242aa2c7dc661a854edd31a6b8b311f009a90742dc9b92db5fc3a69

  • SSDEEP

    3072:KFKmn1MlttMFz8o+F334VSlkfoyHYb/zCHPEhg5JN8x+eDfcAuQPUS9rulhh:KF91MltKaJkHHYb/zCHPEhg5JN8x+eDs

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\082db0fcf214997990a3d0dc3844439f6d98d165b4548bc5c9c56cf88c67b295.exe
    "C:\Users\Admin\AppData\Local\Temp\082db0fcf214997990a3d0dc3844439f6d98d165b4548bc5c9c56cf88c67b295.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4916
    • C:\Users\Admin\zuueyuf.exe
      "C:\Users\Admin\zuueyuf.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4560

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\zuueyuf.exe

    Filesize

    180KB

    MD5

    4797426ec5a833580e22f6a8b3256f8a

    SHA1

    32a4fca9b4d66c495774ac372d63c467e849f3cf

    SHA256

    bcb51f9d1315ab5c093ef49eb2f73f11ef5b0f195601902b7418a799e6b5bbd8

    SHA512

    4f4cee0066235783822b1bd896d32b7bd966fa1977b8d3604f2695f6ccae573c28f49d988a5ca711e5e0403b69ecfe971e42b93421affc0cc21792c6b64ef504

  • C:\Users\Admin\zuueyuf.exe

    Filesize

    180KB

    MD5

    4797426ec5a833580e22f6a8b3256f8a

    SHA1

    32a4fca9b4d66c495774ac372d63c467e849f3cf

    SHA256

    bcb51f9d1315ab5c093ef49eb2f73f11ef5b0f195601902b7418a799e6b5bbd8

    SHA512

    4f4cee0066235783822b1bd896d32b7bd966fa1977b8d3604f2695f6ccae573c28f49d988a5ca711e5e0403b69ecfe971e42b93421affc0cc21792c6b64ef504

  • memory/4560-134-0x0000000000000000-mapping.dmp