Analysis
-
max time kernel
41s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 22:30
Static task
static1
Behavioral task
behavioral1
Sample
2530a6593708eeb77951840e147dba1cf84778d29fb914e793458ffe42d3ec10.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2530a6593708eeb77951840e147dba1cf84778d29fb914e793458ffe42d3ec10.exe
Resource
win10v2004-20220812-en
General
-
Target
2530a6593708eeb77951840e147dba1cf84778d29fb914e793458ffe42d3ec10.exe
-
Size
22.9MB
-
MD5
53f0da7db0c6456aa8e9e3ea423523a6
-
SHA1
dbed78a2e3cddc87a6afb9e081c5c540ca7dfefa
-
SHA256
2530a6593708eeb77951840e147dba1cf84778d29fb914e793458ffe42d3ec10
-
SHA512
62c02ec814d5c184d7525e6a748f223b08cf2c7fc33d894a80d01cc6b5ddbecb4546dbe7c511b328705d3f7f2cd1814dbe5d5bc2324fe5839dab50ca50860bbc
-
SSDEEP
49152:978SIIRjd7TtckwRWCFavtAk3DjUHA2O1qofPQZlkALzqNQ8:97h5dzeavtAkfUg2OgofQzqq8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
zmxueji.exepid process 860 zmxueji.exe -
Loads dropped DLL 4 IoCs
Processes:
2530a6593708eeb77951840e147dba1cf84778d29fb914e793458ffe42d3ec10.exezmxueji.exepid process 1048 2530a6593708eeb77951840e147dba1cf84778d29fb914e793458ffe42d3ec10.exe 860 zmxueji.exe 860 zmxueji.exe 860 zmxueji.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2530a6593708eeb77951840e147dba1cf84778d29fb914e793458ffe42d3ec10.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\zmxueji = "C:\\Users\\Public\\Uwhp\\Uzhog.exe /zmxueji /{E4B00ADA-F175-4BC7-A453-B2A79362FD13}" 2530a6593708eeb77951840e147dba1cf84778d29fb914e793458ffe42d3ec10.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
zmxueji.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main zmxueji.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
zmxueji.exepid process 860 zmxueji.exe 860 zmxueji.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
2530a6593708eeb77951840e147dba1cf84778d29fb914e793458ffe42d3ec10.exeNet.exedescription pid process target process PID 1048 wrote to memory of 948 1048 2530a6593708eeb77951840e147dba1cf84778d29fb914e793458ffe42d3ec10.exe Net.exe PID 1048 wrote to memory of 948 1048 2530a6593708eeb77951840e147dba1cf84778d29fb914e793458ffe42d3ec10.exe Net.exe PID 1048 wrote to memory of 948 1048 2530a6593708eeb77951840e147dba1cf84778d29fb914e793458ffe42d3ec10.exe Net.exe PID 1048 wrote to memory of 948 1048 2530a6593708eeb77951840e147dba1cf84778d29fb914e793458ffe42d3ec10.exe Net.exe PID 1048 wrote to memory of 948 1048 2530a6593708eeb77951840e147dba1cf84778d29fb914e793458ffe42d3ec10.exe Net.exe PID 1048 wrote to memory of 948 1048 2530a6593708eeb77951840e147dba1cf84778d29fb914e793458ffe42d3ec10.exe Net.exe PID 1048 wrote to memory of 948 1048 2530a6593708eeb77951840e147dba1cf84778d29fb914e793458ffe42d3ec10.exe Net.exe PID 948 wrote to memory of 1760 948 Net.exe net1.exe PID 948 wrote to memory of 1760 948 Net.exe net1.exe PID 948 wrote to memory of 1760 948 Net.exe net1.exe PID 948 wrote to memory of 1760 948 Net.exe net1.exe PID 948 wrote to memory of 1760 948 Net.exe net1.exe PID 948 wrote to memory of 1760 948 Net.exe net1.exe PID 948 wrote to memory of 1760 948 Net.exe net1.exe PID 1048 wrote to memory of 860 1048 2530a6593708eeb77951840e147dba1cf84778d29fb914e793458ffe42d3ec10.exe zmxueji.exe PID 1048 wrote to memory of 860 1048 2530a6593708eeb77951840e147dba1cf84778d29fb914e793458ffe42d3ec10.exe zmxueji.exe PID 1048 wrote to memory of 860 1048 2530a6593708eeb77951840e147dba1cf84778d29fb914e793458ffe42d3ec10.exe zmxueji.exe PID 1048 wrote to memory of 860 1048 2530a6593708eeb77951840e147dba1cf84778d29fb914e793458ffe42d3ec10.exe zmxueji.exe PID 1048 wrote to memory of 860 1048 2530a6593708eeb77951840e147dba1cf84778d29fb914e793458ffe42d3ec10.exe zmxueji.exe PID 1048 wrote to memory of 860 1048 2530a6593708eeb77951840e147dba1cf84778d29fb914e793458ffe42d3ec10.exe zmxueji.exe PID 1048 wrote to memory of 860 1048 2530a6593708eeb77951840e147dba1cf84778d29fb914e793458ffe42d3ec10.exe zmxueji.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2530a6593708eeb77951840e147dba1cf84778d29fb914e793458ffe42d3ec10.exe"C:\Users\Admin\AppData\Local\Temp\2530a6593708eeb77951840e147dba1cf84778d29fb914e793458ffe42d3ec10.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\Net.exeNet Stop PcaSvc2⤵
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 Stop PcaSvc3⤵PID:1760
-
-
-
C:\Users\Admin\AppData\Local\Temp\g8172A\zmxueji.exeC:\Users\Admin\AppData\Local\Temp\g8172A\zmxueji.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:860
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD55ffa95a2aa9a96ea13a6dca7b5efb44d
SHA10a4456049316acf30a20ef352b74c686bd81c4d7
SHA256fe29919f590782d51adc9d0163d59bebca5de536169850fa54ba7cda66e3979a
SHA5124e336ba9bf15567a5fb124665882817306cc5e3d20639365a72676804f9f6abf3901310603c1bf3870d6a987d22eb8ba38208231db33b2983bddff7363a99a4a
-
Filesize
1.1MB
MD55ffa95a2aa9a96ea13a6dca7b5efb44d
SHA10a4456049316acf30a20ef352b74c686bd81c4d7
SHA256fe29919f590782d51adc9d0163d59bebca5de536169850fa54ba7cda66e3979a
SHA5124e336ba9bf15567a5fb124665882817306cc5e3d20639365a72676804f9f6abf3901310603c1bf3870d6a987d22eb8ba38208231db33b2983bddff7363a99a4a
-
Filesize
1.1MB
MD55ffa95a2aa9a96ea13a6dca7b5efb44d
SHA10a4456049316acf30a20ef352b74c686bd81c4d7
SHA256fe29919f590782d51adc9d0163d59bebca5de536169850fa54ba7cda66e3979a
SHA5124e336ba9bf15567a5fb124665882817306cc5e3d20639365a72676804f9f6abf3901310603c1bf3870d6a987d22eb8ba38208231db33b2983bddff7363a99a4a
-
Filesize
1.1MB
MD55ffa95a2aa9a96ea13a6dca7b5efb44d
SHA10a4456049316acf30a20ef352b74c686bd81c4d7
SHA256fe29919f590782d51adc9d0163d59bebca5de536169850fa54ba7cda66e3979a
SHA5124e336ba9bf15567a5fb124665882817306cc5e3d20639365a72676804f9f6abf3901310603c1bf3870d6a987d22eb8ba38208231db33b2983bddff7363a99a4a
-
Filesize
1.1MB
MD55ffa95a2aa9a96ea13a6dca7b5efb44d
SHA10a4456049316acf30a20ef352b74c686bd81c4d7
SHA256fe29919f590782d51adc9d0163d59bebca5de536169850fa54ba7cda66e3979a
SHA5124e336ba9bf15567a5fb124665882817306cc5e3d20639365a72676804f9f6abf3901310603c1bf3870d6a987d22eb8ba38208231db33b2983bddff7363a99a4a
-
Filesize
1.1MB
MD55ffa95a2aa9a96ea13a6dca7b5efb44d
SHA10a4456049316acf30a20ef352b74c686bd81c4d7
SHA256fe29919f590782d51adc9d0163d59bebca5de536169850fa54ba7cda66e3979a
SHA5124e336ba9bf15567a5fb124665882817306cc5e3d20639365a72676804f9f6abf3901310603c1bf3870d6a987d22eb8ba38208231db33b2983bddff7363a99a4a