Analysis

  • max time kernel
    153s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 17:35

General

  • Target

    7f3224d1b37ed70a6e08ff03b6d0fe5cc2c311b4949b70d987c86dc9acc6cb9a.exe

  • Size

    164KB

  • MD5

    73a7b0c956a843768e9fa9843d2dba10

  • SHA1

    a5eeaa7ca702c49fe82ef4f7eac4b745a6774130

  • SHA256

    7f3224d1b37ed70a6e08ff03b6d0fe5cc2c311b4949b70d987c86dc9acc6cb9a

  • SHA512

    abcb60bc4ebf347575a5b0282aa5c1d6a1738e01e6cd0c05a10f9c825fd0c732ecb88dce2cb378d7ff83b98edb9391e2344360c3caef00226c05d500c465a20b

  • SSDEEP

    3072:JoHDN+3uCog8lq0mEQZXPb+OXBJatOdS7dcovquoF+N7bZD16iYIQusGGTkLGFMD:gGu9Tlqn3XPaptOdS7dcovquoF+N7bZJ

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f3224d1b37ed70a6e08ff03b6d0fe5cc2c311b4949b70d987c86dc9acc6cb9a.exe
    "C:\Users\Admin\AppData\Local\Temp\7f3224d1b37ed70a6e08ff03b6d0fe5cc2c311b4949b70d987c86dc9acc6cb9a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3156
    • C:\Users\Admin\zftaq.exe
      "C:\Users\Admin\zftaq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3504

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\zftaq.exe

    Filesize

    164KB

    MD5

    179ee52625b8cf1fb2464448de6f3d87

    SHA1

    c3e15223129e08803c84fa85464601949c3370f7

    SHA256

    f7933963bbf393b950dc40d79d217098be54d2694cb38e2cefe77d02569e74e6

    SHA512

    f41f1625eed8502b1e84904df6356d675a6e3aadbe1e49f5e068efb673ab8e8fb69801dfb26655fecdc6e98cb93b26914c168a0d8028eae660b79d62eb9885c4

  • C:\Users\Admin\zftaq.exe

    Filesize

    164KB

    MD5

    179ee52625b8cf1fb2464448de6f3d87

    SHA1

    c3e15223129e08803c84fa85464601949c3370f7

    SHA256

    f7933963bbf393b950dc40d79d217098be54d2694cb38e2cefe77d02569e74e6

    SHA512

    f41f1625eed8502b1e84904df6356d675a6e3aadbe1e49f5e068efb673ab8e8fb69801dfb26655fecdc6e98cb93b26914c168a0d8028eae660b79d62eb9885c4