Analysis
-
max time kernel
194s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 00:22
Static task
static1
Behavioral task
behavioral1
Sample
f5a17b90c98709ba61afff6e9a01ba679f7ded79480c6447019d5111eca2788e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f5a17b90c98709ba61afff6e9a01ba679f7ded79480c6447019d5111eca2788e.exe
Resource
win10v2004-20221111-en
General
-
Target
f5a17b90c98709ba61afff6e9a01ba679f7ded79480c6447019d5111eca2788e.exe
-
Size
184KB
-
MD5
16a93d1b8bc0cf55e4e8048ace33e24f
-
SHA1
899ed268b5c09119ffa8f3e49bdbb8cc3a501493
-
SHA256
f5a17b90c98709ba61afff6e9a01ba679f7ded79480c6447019d5111eca2788e
-
SHA512
5e90377bffeca100c91455b6865018752d7e45775462df0b161a2494986b2f94691fea20f3b0a030d6b5de384c53eb414fede069dae1cf319a0ab2585f2778b6
-
SSDEEP
3072:EiPyY93+BEF8F+7+w3wrOwo9aDZQNfEq02wfG:EiPyY1+T0fZH
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
f5a17b90c98709ba61afff6e9a01ba679f7ded79480c6447019d5111eca2788e.exebzbaek.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" f5a17b90c98709ba61afff6e9a01ba679f7ded79480c6447019d5111eca2788e.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bzbaek.exe -
Executes dropped EXE 1 IoCs
Processes:
bzbaek.exepid process 4728 bzbaek.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f5a17b90c98709ba61afff6e9a01ba679f7ded79480c6447019d5111eca2788e.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation f5a17b90c98709ba61afff6e9a01ba679f7ded79480c6447019d5111eca2788e.exe -
Adds Run key to start application 2 TTPs 29 IoCs
Processes:
bzbaek.exef5a17b90c98709ba61afff6e9a01ba679f7ded79480c6447019d5111eca2788e.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /n" bzbaek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /x" bzbaek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /p" bzbaek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /z" bzbaek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /l" bzbaek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /r" bzbaek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /i" bzbaek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /h" bzbaek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /a" bzbaek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /u" bzbaek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /s" bzbaek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /d" bzbaek.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Windows\CurrentVersion\Run\ f5a17b90c98709ba61afff6e9a01ba679f7ded79480c6447019d5111eca2788e.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /y" bzbaek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /b" bzbaek.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Windows\CurrentVersion\Run\ bzbaek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /o" bzbaek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /e" bzbaek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /q" bzbaek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /g" bzbaek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /j" bzbaek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /q" f5a17b90c98709ba61afff6e9a01ba679f7ded79480c6447019d5111eca2788e.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /m" bzbaek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /w" bzbaek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /v" bzbaek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /c" bzbaek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /k" bzbaek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /f" bzbaek.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bzbaek = "C:\\Users\\Admin\\bzbaek.exe /t" bzbaek.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
f5a17b90c98709ba61afff6e9a01ba679f7ded79480c6447019d5111eca2788e.exebzbaek.exepid process 3344 f5a17b90c98709ba61afff6e9a01ba679f7ded79480c6447019d5111eca2788e.exe 3344 f5a17b90c98709ba61afff6e9a01ba679f7ded79480c6447019d5111eca2788e.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe 4728 bzbaek.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
f5a17b90c98709ba61afff6e9a01ba679f7ded79480c6447019d5111eca2788e.exebzbaek.exepid process 3344 f5a17b90c98709ba61afff6e9a01ba679f7ded79480c6447019d5111eca2788e.exe 4728 bzbaek.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
f5a17b90c98709ba61afff6e9a01ba679f7ded79480c6447019d5111eca2788e.exedescription pid process target process PID 3344 wrote to memory of 4728 3344 f5a17b90c98709ba61afff6e9a01ba679f7ded79480c6447019d5111eca2788e.exe bzbaek.exe PID 3344 wrote to memory of 4728 3344 f5a17b90c98709ba61afff6e9a01ba679f7ded79480c6447019d5111eca2788e.exe bzbaek.exe PID 3344 wrote to memory of 4728 3344 f5a17b90c98709ba61afff6e9a01ba679f7ded79480c6447019d5111eca2788e.exe bzbaek.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5a17b90c98709ba61afff6e9a01ba679f7ded79480c6447019d5111eca2788e.exe"C:\Users\Admin\AppData\Local\Temp\f5a17b90c98709ba61afff6e9a01ba679f7ded79480c6447019d5111eca2788e.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\bzbaek.exe"C:\Users\Admin\bzbaek.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4728
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5c5d92fde507ee25a0288e4b4eb772215
SHA14c2b47d5ecfb9a6021ada3ebd9fb0ee5f2a99c63
SHA25680eb85c188272488f58fa1c12fb6686dca7ed121e2085750103d7e6da4fc0a62
SHA512e913915620219b9ca68d68a2150d05a6026f08e2c5c130796fd767963eeb36d5670f973d4f8c053a2cab201ffea16122d4a15d0f98d466e2ae7beb7db33958c3
-
Filesize
184KB
MD5c5d92fde507ee25a0288e4b4eb772215
SHA14c2b47d5ecfb9a6021ada3ebd9fb0ee5f2a99c63
SHA25680eb85c188272488f58fa1c12fb6686dca7ed121e2085750103d7e6da4fc0a62
SHA512e913915620219b9ca68d68a2150d05a6026f08e2c5c130796fd767963eeb36d5670f973d4f8c053a2cab201ffea16122d4a15d0f98d466e2ae7beb7db33958c3