Analysis

  • max time kernel
    203s
  • max time network
    225s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 18:52

General

  • Target

    98c9b4d6aad5b68af1160ed2dd0a7e7979c5cefa1742494990c35af8e6f824fa.exe

  • Size

    140KB

  • MD5

    9d451f4f7164a9afd21f0343cb1ba388

  • SHA1

    e27794fa0a125af901e7bd8e888aaa2fe3e1b025

  • SHA256

    98c9b4d6aad5b68af1160ed2dd0a7e7979c5cefa1742494990c35af8e6f824fa

  • SHA512

    ee7519ae7829c332caa8b5dfdbee82cf43871ebe89ae7eb314cd4046cc26234b6f05cb807c2a2f60bbee4d3bbd2d21cbb35ec079be143666f25b6cb8396f0554

  • SSDEEP

    768:zXMEgyt4pd04q0zik+vhy7g0EM/LinbQea:LieEn3+pCg0EUGQea

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98c9b4d6aad5b68af1160ed2dd0a7e7979c5cefa1742494990c35af8e6f824fa.exe
    "C:\Users\Admin\AppData\Local\Temp\98c9b4d6aad5b68af1160ed2dd0a7e7979c5cefa1742494990c35af8e6f824fa.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Users\Admin\zjyev.exe
      "C:\Users\Admin\zjyev.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4176

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\zjyev.exe

          Filesize

          140KB

          MD5

          c74adcb0848898e93b1b73d6abc176eb

          SHA1

          dea9342145a44bd666e55c23f03faa87daff343a

          SHA256

          69c376ff2330c3cf83f0bcfd481dc2a050119c1b47f36a2fa323647894955a6b

          SHA512

          c4c84b63e56cf00b54ab1b9ea0b8e6e09b2c0ed613b2c8a05e01d005b546b00a6d79b932ff57608aa3f87d85838c74a3dc127ce00e00348f341f4e14ed06929c

        • C:\Users\Admin\zjyev.exe

          Filesize

          140KB

          MD5

          c74adcb0848898e93b1b73d6abc176eb

          SHA1

          dea9342145a44bd666e55c23f03faa87daff343a

          SHA256

          69c376ff2330c3cf83f0bcfd481dc2a050119c1b47f36a2fa323647894955a6b

          SHA512

          c4c84b63e56cf00b54ab1b9ea0b8e6e09b2c0ed613b2c8a05e01d005b546b00a6d79b932ff57608aa3f87d85838c74a3dc127ce00e00348f341f4e14ed06929c