Analysis
-
max time kernel
63s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:22
Static task
static1
Behavioral task
behavioral1
Sample
394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe
Resource
win10v2004-20220812-en
General
-
Target
394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe
-
Size
284KB
-
MD5
16545ed81a2a78159ff6817af2af6204
-
SHA1
d33c3d01ff1ff54d59aee92241f71416f07deb0f
-
SHA256
394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7
-
SHA512
160546bd5a36a3aa39e9a3f7367f2ab991485dbede343fa4f89f20469875130841f7a656f9565af8d813aac895014e4616234ba63d6d70e3fc3546740e2509f5
-
SSDEEP
6144:tZtIRD1t1aZMIvEl0E9/DIVpgAXL0LedMWs4QNJdaGcGGZ0GbNXht+6h0SItIBjp:tZtIRD71aZMIvEl0E9/DIVpgAXL0LedD
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exezyzoq.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zyzoq.exe -
Executes dropped EXE 1 IoCs
Processes:
zyzoq.exepid process 1200 zyzoq.exe -
Loads dropped DLL 2 IoCs
Processes:
394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exepid process 1600 394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe 1600 394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe -
Adds Run key to start application 2 TTPs 25 IoCs
Processes:
zyzoq.exe394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zyzoq = "C:\\Users\\Admin\\zyzoq.exe /v" zyzoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zyzoq = "C:\\Users\\Admin\\zyzoq.exe /q" zyzoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zyzoq = "C:\\Users\\Admin\\zyzoq.exe /y" zyzoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zyzoq = "C:\\Users\\Admin\\zyzoq.exe /b" zyzoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zyzoq = "C:\\Users\\Admin\\zyzoq.exe /j" zyzoq.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zyzoq = "C:\\Users\\Admin\\zyzoq.exe /l" zyzoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zyzoq = "C:\\Users\\Admin\\zyzoq.exe /r" zyzoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zyzoq = "C:\\Users\\Admin\\zyzoq.exe /z" zyzoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zyzoq = "C:\\Users\\Admin\\zyzoq.exe /o" zyzoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zyzoq = "C:\\Users\\Admin\\zyzoq.exe /w" zyzoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zyzoq = "C:\\Users\\Admin\\zyzoq.exe /u" zyzoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zyzoq = "C:\\Users\\Admin\\zyzoq.exe /t" zyzoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zyzoq = "C:\\Users\\Admin\\zyzoq.exe /p" zyzoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zyzoq = "C:\\Users\\Admin\\zyzoq.exe /f" zyzoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zyzoq = "C:\\Users\\Admin\\zyzoq.exe /i" zyzoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zyzoq = "C:\\Users\\Admin\\zyzoq.exe /t" 394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zyzoq = "C:\\Users\\Admin\\zyzoq.exe /h" zyzoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zyzoq = "C:\\Users\\Admin\\zyzoq.exe /n" zyzoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zyzoq = "C:\\Users\\Admin\\zyzoq.exe /d" zyzoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zyzoq = "C:\\Users\\Admin\\zyzoq.exe /m" zyzoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zyzoq = "C:\\Users\\Admin\\zyzoq.exe /a" zyzoq.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ zyzoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zyzoq = "C:\\Users\\Admin\\zyzoq.exe /c" zyzoq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zyzoq = "C:\\Users\\Admin\\zyzoq.exe /e" zyzoq.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
zyzoq.exe394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum zyzoq.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 zyzoq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 52 IoCs
Processes:
394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exezyzoq.exepid process 1600 394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe 1200 zyzoq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exezyzoq.exepid process 1600 394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe 1200 zyzoq.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exedescription pid process target process PID 1600 wrote to memory of 1200 1600 394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe zyzoq.exe PID 1600 wrote to memory of 1200 1600 394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe zyzoq.exe PID 1600 wrote to memory of 1200 1600 394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe zyzoq.exe PID 1600 wrote to memory of 1200 1600 394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe zyzoq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe"C:\Users\Admin\AppData\Local\Temp\394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\zyzoq.exe"C:\Users\Admin\zyzoq.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1200
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD516545ed81a2a78159ff6817af2af6204
SHA1d33c3d01ff1ff54d59aee92241f71416f07deb0f
SHA256394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7
SHA512160546bd5a36a3aa39e9a3f7367f2ab991485dbede343fa4f89f20469875130841f7a656f9565af8d813aac895014e4616234ba63d6d70e3fc3546740e2509f5
-
Filesize
284KB
MD516545ed81a2a78159ff6817af2af6204
SHA1d33c3d01ff1ff54d59aee92241f71416f07deb0f
SHA256394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7
SHA512160546bd5a36a3aa39e9a3f7367f2ab991485dbede343fa4f89f20469875130841f7a656f9565af8d813aac895014e4616234ba63d6d70e3fc3546740e2509f5
-
Filesize
284KB
MD516545ed81a2a78159ff6817af2af6204
SHA1d33c3d01ff1ff54d59aee92241f71416f07deb0f
SHA256394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7
SHA512160546bd5a36a3aa39e9a3f7367f2ab991485dbede343fa4f89f20469875130841f7a656f9565af8d813aac895014e4616234ba63d6d70e3fc3546740e2509f5
-
Filesize
284KB
MD516545ed81a2a78159ff6817af2af6204
SHA1d33c3d01ff1ff54d59aee92241f71416f07deb0f
SHA256394654a992f0e09f7d7fcba4738e37ecdeef695b5fa882cbbf1fa6b4ab4553d7
SHA512160546bd5a36a3aa39e9a3f7367f2ab991485dbede343fa4f89f20469875130841f7a656f9565af8d813aac895014e4616234ba63d6d70e3fc3546740e2509f5