Analysis
-
max time kernel
153s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 00:18
Static task
static1
Behavioral task
behavioral1
Sample
d6796134eedc4885d46aec5b7735ab1e9390453aff09a5fb9a0f0f225df210d6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d6796134eedc4885d46aec5b7735ab1e9390453aff09a5fb9a0f0f225df210d6.exe
Resource
win10v2004-20221111-en
General
-
Target
d6796134eedc4885d46aec5b7735ab1e9390453aff09a5fb9a0f0f225df210d6.exe
-
Size
284KB
-
MD5
06ef381b13272c3d0660e5729ebd7777
-
SHA1
8b26d3de637de213dbd2e54fb8df82d2e21fbf98
-
SHA256
d6796134eedc4885d46aec5b7735ab1e9390453aff09a5fb9a0f0f225df210d6
-
SHA512
5204af54e3185c401a2280404506fcc258d7a33eb42e2b4c3c1ced79ef77f22a03e4efe3e6733c4eece9156f37ac5c3512ade213cb5c6d8891bc16d0565b8b2e
-
SSDEEP
3072:y0A2afa1LZH6bn4DpS41Zr8EbjfmNwXl1RgxfGDP8F2dqMOkeuF7SzoBBXbB1L:Ray1LZ6z4Dp7R8cA0l1RpLtJj7SknrDL
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
hvzeb.exed6796134eedc4885d46aec5b7735ab1e9390453aff09a5fb9a0f0f225df210d6.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hvzeb.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" d6796134eedc4885d46aec5b7735ab1e9390453aff09a5fb9a0f0f225df210d6.exe -
Executes dropped EXE 1 IoCs
Processes:
hvzeb.exepid process 1516 hvzeb.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d6796134eedc4885d46aec5b7735ab1e9390453aff09a5fb9a0f0f225df210d6.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation d6796134eedc4885d46aec5b7735ab1e9390453aff09a5fb9a0f0f225df210d6.exe -
Adds Run key to start application 2 TTPs 51 IoCs
Processes:
hvzeb.exed6796134eedc4885d46aec5b7735ab1e9390453aff09a5fb9a0f0f225df210d6.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /a" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /I" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /u" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /b" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /N" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /z" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /x" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /X" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /E" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /W" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /h" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /G" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /y" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /T" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /c" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /i" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /V" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /l" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /w" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /M" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /d" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /f" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /m" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /J" d6796134eedc4885d46aec5b7735ab1e9390453aff09a5fb9a0f0f225df210d6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /Q" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /H" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /R" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /O" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /s" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /j" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /e" hvzeb.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run\ d6796134eedc4885d46aec5b7735ab1e9390453aff09a5fb9a0f0f225df210d6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /F" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /S" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /k" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /P" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /L" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /C" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /B" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /J" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /g" hvzeb.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run\ hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /U" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /n" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /Z" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /o" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /K" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /r" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /t" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /A" hvzeb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hvzeb = "C:\\Users\\Admin\\hvzeb.exe /q" hvzeb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d6796134eedc4885d46aec5b7735ab1e9390453aff09a5fb9a0f0f225df210d6.exehvzeb.exepid process 4944 d6796134eedc4885d46aec5b7735ab1e9390453aff09a5fb9a0f0f225df210d6.exe 4944 d6796134eedc4885d46aec5b7735ab1e9390453aff09a5fb9a0f0f225df210d6.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe 1516 hvzeb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
d6796134eedc4885d46aec5b7735ab1e9390453aff09a5fb9a0f0f225df210d6.exehvzeb.exepid process 4944 d6796134eedc4885d46aec5b7735ab1e9390453aff09a5fb9a0f0f225df210d6.exe 1516 hvzeb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
d6796134eedc4885d46aec5b7735ab1e9390453aff09a5fb9a0f0f225df210d6.exedescription pid process target process PID 4944 wrote to memory of 1516 4944 d6796134eedc4885d46aec5b7735ab1e9390453aff09a5fb9a0f0f225df210d6.exe hvzeb.exe PID 4944 wrote to memory of 1516 4944 d6796134eedc4885d46aec5b7735ab1e9390453aff09a5fb9a0f0f225df210d6.exe hvzeb.exe PID 4944 wrote to memory of 1516 4944 d6796134eedc4885d46aec5b7735ab1e9390453aff09a5fb9a0f0f225df210d6.exe hvzeb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6796134eedc4885d46aec5b7735ab1e9390453aff09a5fb9a0f0f225df210d6.exe"C:\Users\Admin\AppData\Local\Temp\d6796134eedc4885d46aec5b7735ab1e9390453aff09a5fb9a0f0f225df210d6.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\hvzeb.exe"C:\Users\Admin\hvzeb.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1516
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD506d65ced69f2e8ffd003ec13b618350f
SHA18d1a25b65d3a1c2a00a37b20b3deab5dc137d499
SHA256c12a03b0fe2c44cb43f3355d521fe9a0c7ea92f0fae3c3be53b57080587fb6b6
SHA5127d3b49ab3cd55c90073d1da8c06e1b7a690de0ef486ed9ace68bfddafad9950ce187a72a074b70a39276fc1567c2b14d1b7e1ef7d7e0f3f8308c0e2b759ad339
-
Filesize
284KB
MD506d65ced69f2e8ffd003ec13b618350f
SHA18d1a25b65d3a1c2a00a37b20b3deab5dc137d499
SHA256c12a03b0fe2c44cb43f3355d521fe9a0c7ea92f0fae3c3be53b57080587fb6b6
SHA5127d3b49ab3cd55c90073d1da8c06e1b7a690de0ef486ed9ace68bfddafad9950ce187a72a074b70a39276fc1567c2b14d1b7e1ef7d7e0f3f8308c0e2b759ad339