Analysis
-
max time kernel
216s -
max time network
232s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 15:24
Static task
static1
Behavioral task
behavioral1
Sample
237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe
Resource
win10v2004-20221111-en
General
-
Target
237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe
-
Size
936KB
-
MD5
e2897ef6da452da4b7276443f4a5bb3f
-
SHA1
556aee59e0e1db6a4ad7f5a3cc611ecf10b119d7
-
SHA256
237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e
-
SHA512
150f5d44ea841e1fc53df850a727585e12d75bd9925e5e7dd71532bfd7b446a02103e8ff689180b1dc72401d1bde9ebd55774d0f423f13bc1c348feaee8fc1dd
-
SSDEEP
24576:ldCf5l+hpoq2iHU/0PdIT0TmsIoiQTqxHfcL9rE7CAjvM:3Cf5l+hpoq2iO0lITcILk8cL947C
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Program Filez\\ZSoft\\service.exe" 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe -
Executes dropped EXE 2 IoCs
pid Process 4824 service.exe 4376 service.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate service.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ZSoft Uninstaller = "C:\\Program Filez\\ZSoft\\service.exe" 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ZSoft Uninstaller = "C:\\Program Filez\\ZSoft\\service.exe" notepad.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3136 set thread context of 4056 3136 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 81 PID 4824 set thread context of 4376 4824 service.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier service.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier service.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 service.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString service.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier service.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4376 service.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Token: SeSecurityPrivilege 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Token: SeTakeOwnershipPrivilege 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Token: SeLoadDriverPrivilege 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Token: SeSystemProfilePrivilege 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Token: SeSystemtimePrivilege 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Token: SeProfSingleProcessPrivilege 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Token: SeIncBasePriorityPrivilege 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Token: SeCreatePagefilePrivilege 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Token: SeBackupPrivilege 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Token: SeRestorePrivilege 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Token: SeShutdownPrivilege 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Token: SeDebugPrivilege 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Token: SeSystemEnvironmentPrivilege 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Token: SeChangeNotifyPrivilege 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Token: SeRemoteShutdownPrivilege 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Token: SeUndockPrivilege 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Token: SeManageVolumePrivilege 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Token: SeImpersonatePrivilege 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Token: SeCreateGlobalPrivilege 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Token: 33 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Token: 34 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Token: 35 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Token: 36 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe Token: SeIncreaseQuotaPrivilege 4376 service.exe Token: SeSecurityPrivilege 4376 service.exe Token: SeTakeOwnershipPrivilege 4376 service.exe Token: SeLoadDriverPrivilege 4376 service.exe Token: SeSystemProfilePrivilege 4376 service.exe Token: SeSystemtimePrivilege 4376 service.exe Token: SeProfSingleProcessPrivilege 4376 service.exe Token: SeIncBasePriorityPrivilege 4376 service.exe Token: SeCreatePagefilePrivilege 4376 service.exe Token: SeBackupPrivilege 4376 service.exe Token: SeRestorePrivilege 4376 service.exe Token: SeShutdownPrivilege 4376 service.exe Token: SeDebugPrivilege 4376 service.exe Token: SeSystemEnvironmentPrivilege 4376 service.exe Token: SeChangeNotifyPrivilege 4376 service.exe Token: SeRemoteShutdownPrivilege 4376 service.exe Token: SeUndockPrivilege 4376 service.exe Token: SeManageVolumePrivilege 4376 service.exe Token: SeImpersonatePrivilege 4376 service.exe Token: SeCreateGlobalPrivilege 4376 service.exe Token: 33 4376 service.exe Token: 34 4376 service.exe Token: 35 4376 service.exe Token: 36 4376 service.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3136 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 4824 service.exe 4376 service.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 3136 wrote to memory of 4056 3136 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 81 PID 3136 wrote to memory of 4056 3136 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 81 PID 3136 wrote to memory of 4056 3136 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 81 PID 3136 wrote to memory of 4056 3136 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 81 PID 3136 wrote to memory of 4056 3136 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 81 PID 3136 wrote to memory of 4056 3136 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 81 PID 3136 wrote to memory of 4056 3136 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 81 PID 3136 wrote to memory of 4056 3136 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 81 PID 3136 wrote to memory of 4056 3136 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 81 PID 3136 wrote to memory of 4056 3136 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 81 PID 3136 wrote to memory of 4056 3136 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 81 PID 3136 wrote to memory of 4056 3136 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 81 PID 3136 wrote to memory of 4056 3136 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 81 PID 3136 wrote to memory of 4056 3136 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 81 PID 4056 wrote to memory of 2860 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 82 PID 4056 wrote to memory of 2860 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 82 PID 4056 wrote to memory of 2860 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 82 PID 4056 wrote to memory of 2860 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 82 PID 4056 wrote to memory of 2860 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 82 PID 4056 wrote to memory of 2860 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 82 PID 4056 wrote to memory of 2860 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 82 PID 4056 wrote to memory of 2860 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 82 PID 4056 wrote to memory of 2860 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 82 PID 4056 wrote to memory of 2860 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 82 PID 4056 wrote to memory of 2860 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 82 PID 4056 wrote to memory of 2860 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 82 PID 4056 wrote to memory of 2860 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 82 PID 4056 wrote to memory of 2860 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 82 PID 4056 wrote to memory of 2860 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 82 PID 4056 wrote to memory of 2860 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 82 PID 4056 wrote to memory of 2860 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 82 PID 4056 wrote to memory of 2860 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 82 PID 4056 wrote to memory of 2860 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 82 PID 4056 wrote to memory of 2860 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 82 PID 4056 wrote to memory of 2860 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 82 PID 4056 wrote to memory of 2860 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 82 PID 4056 wrote to memory of 2860 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 82 PID 4056 wrote to memory of 2092 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 83 PID 4056 wrote to memory of 2092 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 83 PID 4056 wrote to memory of 2092 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 83 PID 4056 wrote to memory of 4824 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 84 PID 4056 wrote to memory of 4824 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 84 PID 4056 wrote to memory of 4824 4056 237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe 84 PID 4824 wrote to memory of 4376 4824 service.exe 85 PID 4824 wrote to memory of 4376 4824 service.exe 85 PID 4824 wrote to memory of 4376 4824 service.exe 85 PID 4824 wrote to memory of 4376 4824 service.exe 85 PID 4824 wrote to memory of 4376 4824 service.exe 85 PID 4824 wrote to memory of 4376 4824 service.exe 85 PID 4824 wrote to memory of 4376 4824 service.exe 85 PID 4824 wrote to memory of 4376 4824 service.exe 85 PID 4824 wrote to memory of 4376 4824 service.exe 85 PID 4824 wrote to memory of 4376 4824 service.exe 85 PID 4824 wrote to memory of 4376 4824 service.exe 85 PID 4824 wrote to memory of 4376 4824 service.exe 85 PID 4824 wrote to memory of 4376 4824 service.exe 85 PID 4824 wrote to memory of 4376 4824 service.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe"C:\Users\Admin\AppData\Local\Temp\237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe"C:\Users\Admin\AppData\Local\Temp\237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e.exe"2⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Adds Run key to start application
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\notepad.exenotepad3⤵
- Adds Run key to start application
PID:2860
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵PID:2092
-
-
C:\Program Filez\ZSoft\service.exe"C:\Program Filez\ZSoft\service.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Program Filez\ZSoft\service.exe"C:\Program Filez\ZSoft\service.exe"4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4376
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
936KB
MD5e2897ef6da452da4b7276443f4a5bb3f
SHA1556aee59e0e1db6a4ad7f5a3cc611ecf10b119d7
SHA256237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e
SHA512150f5d44ea841e1fc53df850a727585e12d75bd9925e5e7dd71532bfd7b446a02103e8ff689180b1dc72401d1bde9ebd55774d0f423f13bc1c348feaee8fc1dd
-
Filesize
936KB
MD5e2897ef6da452da4b7276443f4a5bb3f
SHA1556aee59e0e1db6a4ad7f5a3cc611ecf10b119d7
SHA256237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e
SHA512150f5d44ea841e1fc53df850a727585e12d75bd9925e5e7dd71532bfd7b446a02103e8ff689180b1dc72401d1bde9ebd55774d0f423f13bc1c348feaee8fc1dd
-
Filesize
936KB
MD5e2897ef6da452da4b7276443f4a5bb3f
SHA1556aee59e0e1db6a4ad7f5a3cc611ecf10b119d7
SHA256237ffbd71f9fa5afe7de6b6801502614cc37c07797e01c2053bfafe9cffc895e
SHA512150f5d44ea841e1fc53df850a727585e12d75bd9925e5e7dd71532bfd7b446a02103e8ff689180b1dc72401d1bde9ebd55774d0f423f13bc1c348feaee8fc1dd