Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 19:02
Static task
static1
Behavioral task
behavioral1
Sample
3d822410b7fea598510fbfad7a2c8b8439c804fdfd389a8a17381ee12364342f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3d822410b7fea598510fbfad7a2c8b8439c804fdfd389a8a17381ee12364342f.exe
Resource
win10v2004-20220901-en
General
-
Target
3d822410b7fea598510fbfad7a2c8b8439c804fdfd389a8a17381ee12364342f.exe
-
Size
144KB
-
MD5
464e6d38e7e084adf4b11a652f3d0ac0
-
SHA1
49b55e455e591a0491c5111a24bd82f2d530ce47
-
SHA256
3d822410b7fea598510fbfad7a2c8b8439c804fdfd389a8a17381ee12364342f
-
SHA512
4df0e9da73a6b14f3cb876007be0c79e166b05647154217067034b142a946577a607dbb7139bf30df6681494f405f575429a616c334b08cfe050571affff67af
-
SSDEEP
3072:N6n6lcWd5gVUL5mynf1lFCm8hlJvzMwgv21s4oQZiEWX:N6n521Cm8hlJvzMwgvpWw
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
3d822410b7fea598510fbfad7a2c8b8439c804fdfd389a8a17381ee12364342f.exezealoe.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 3d822410b7fea598510fbfad7a2c8b8439c804fdfd389a8a17381ee12364342f.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zealoe.exe -
Executes dropped EXE 1 IoCs
Processes:
zealoe.exepid process 2236 zealoe.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3d822410b7fea598510fbfad7a2c8b8439c804fdfd389a8a17381ee12364342f.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 3d822410b7fea598510fbfad7a2c8b8439c804fdfd389a8a17381ee12364342f.exe -
Adds Run key to start application 2 TTPs 52 IoCs
Processes:
zealoe.exe3d822410b7fea598510fbfad7a2c8b8439c804fdfd389a8a17381ee12364342f.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /o" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /s" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /x" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /R" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /Z" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /W" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /K" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /S" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /A" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /t" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /N" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /M" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /j" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /Q" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /D" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /e" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /h" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /b" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /a" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /P" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /r" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /G" zealoe.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /v" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /n" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /J" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /O" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /H" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /p" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /v" 3d822410b7fea598510fbfad7a2c8b8439c804fdfd389a8a17381ee12364342f.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /E" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /w" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /B" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /F" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /I" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /C" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /d" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /l" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /m" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /T" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /k" zealoe.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 3d822410b7fea598510fbfad7a2c8b8439c804fdfd389a8a17381ee12364342f.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /q" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /X" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /V" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /i" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /u" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /Y" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /z" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /c" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /L" zealoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zealoe = "C:\\Users\\Admin\\zealoe.exe /y" zealoe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3d822410b7fea598510fbfad7a2c8b8439c804fdfd389a8a17381ee12364342f.exezealoe.exepid process 2328 3d822410b7fea598510fbfad7a2c8b8439c804fdfd389a8a17381ee12364342f.exe 2328 3d822410b7fea598510fbfad7a2c8b8439c804fdfd389a8a17381ee12364342f.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe 2236 zealoe.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
3d822410b7fea598510fbfad7a2c8b8439c804fdfd389a8a17381ee12364342f.exezealoe.exepid process 2328 3d822410b7fea598510fbfad7a2c8b8439c804fdfd389a8a17381ee12364342f.exe 2236 zealoe.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
3d822410b7fea598510fbfad7a2c8b8439c804fdfd389a8a17381ee12364342f.exedescription pid process target process PID 2328 wrote to memory of 2236 2328 3d822410b7fea598510fbfad7a2c8b8439c804fdfd389a8a17381ee12364342f.exe zealoe.exe PID 2328 wrote to memory of 2236 2328 3d822410b7fea598510fbfad7a2c8b8439c804fdfd389a8a17381ee12364342f.exe zealoe.exe PID 2328 wrote to memory of 2236 2328 3d822410b7fea598510fbfad7a2c8b8439c804fdfd389a8a17381ee12364342f.exe zealoe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d822410b7fea598510fbfad7a2c8b8439c804fdfd389a8a17381ee12364342f.exe"C:\Users\Admin\AppData\Local\Temp\3d822410b7fea598510fbfad7a2c8b8439c804fdfd389a8a17381ee12364342f.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\zealoe.exe"C:\Users\Admin\zealoe.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2236
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD57c953962b733d8d7578a7737c539a017
SHA1a74a5e3e74acfbcce4281217fd8a6bd8cca9793d
SHA256be3f34e080787df9cf9f56974c23d920c2c553a89f115b8520dde2dba4379e3f
SHA51200b00ec21bfc12c6c51c9020c00dde4ef29c4c38bf6e6d5ae982be6459ee3561c42a3061c4ff0c3299a4bfaad257d112a9a55ed373463c72b174a5e96e4fa04d
-
Filesize
144KB
MD57c953962b733d8d7578a7737c539a017
SHA1a74a5e3e74acfbcce4281217fd8a6bd8cca9793d
SHA256be3f34e080787df9cf9f56974c23d920c2c553a89f115b8520dde2dba4379e3f
SHA51200b00ec21bfc12c6c51c9020c00dde4ef29c4c38bf6e6d5ae982be6459ee3561c42a3061c4ff0c3299a4bfaad257d112a9a55ed373463c72b174a5e96e4fa04d