Analysis

  • max time kernel
    248s
  • max time network
    336s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 17:19

General

  • Target

    a7bb0cd88fa3f53e8644a7f35c739014fd93fa632e8c27f30cddbdce099bfdde.exe

  • Size

    240KB

  • MD5

    81767ebcc9384a8b6cee9900a7c6eed1

  • SHA1

    1ceb5330fd9ba4f40bdd6d57b934c1129c8efe16

  • SHA256

    a7bb0cd88fa3f53e8644a7f35c739014fd93fa632e8c27f30cddbdce099bfdde

  • SHA512

    53e011876a6bc480266a6339b671776cda46b1a709b8913ea3773cd84bf7392f05b27e88c230d797bc206cb58651bfec05d3734eec1fdf04d2f04ed600fcb83e

  • SSDEEP

    6144:Sd3dwqsNTNEXGlQR58EqxF6snji81RUinKq3aEESliDng:SpdQKjeaEEpc

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7bb0cd88fa3f53e8644a7f35c739014fd93fa632e8c27f30cddbdce099bfdde.exe
    "C:\Users\Admin\AppData\Local\Temp\a7bb0cd88fa3f53e8644a7f35c739014fd93fa632e8c27f30cddbdce099bfdde.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:520
    • C:\Users\Admin\zuazi.exe
      "C:\Users\Admin\zuazi.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:468

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\zuazi.exe

    Filesize

    240KB

    MD5

    c69e9bcaab7d5f8a374972008bcd9451

    SHA1

    4b631e9f6b2515081328bc421302442f9d6c4313

    SHA256

    a0679945f68b4dec75c046098078845dfae45abd88b7654b9a00a5b466f837d8

    SHA512

    5f039f14c976c0ed9abb81d7351c8a7057cfb408f3b3d692f6f5620ad070f62775493f6eddce15bc264ed72508b01e0ce3ad95db66f649acd660eb047a507b70

  • C:\Users\Admin\zuazi.exe

    Filesize

    240KB

    MD5

    c69e9bcaab7d5f8a374972008bcd9451

    SHA1

    4b631e9f6b2515081328bc421302442f9d6c4313

    SHA256

    a0679945f68b4dec75c046098078845dfae45abd88b7654b9a00a5b466f837d8

    SHA512

    5f039f14c976c0ed9abb81d7351c8a7057cfb408f3b3d692f6f5620ad070f62775493f6eddce15bc264ed72508b01e0ce3ad95db66f649acd660eb047a507b70

  • \Users\Admin\zuazi.exe

    Filesize

    240KB

    MD5

    c69e9bcaab7d5f8a374972008bcd9451

    SHA1

    4b631e9f6b2515081328bc421302442f9d6c4313

    SHA256

    a0679945f68b4dec75c046098078845dfae45abd88b7654b9a00a5b466f837d8

    SHA512

    5f039f14c976c0ed9abb81d7351c8a7057cfb408f3b3d692f6f5620ad070f62775493f6eddce15bc264ed72508b01e0ce3ad95db66f649acd660eb047a507b70

  • \Users\Admin\zuazi.exe

    Filesize

    240KB

    MD5

    c69e9bcaab7d5f8a374972008bcd9451

    SHA1

    4b631e9f6b2515081328bc421302442f9d6c4313

    SHA256

    a0679945f68b4dec75c046098078845dfae45abd88b7654b9a00a5b466f837d8

    SHA512

    5f039f14c976c0ed9abb81d7351c8a7057cfb408f3b3d692f6f5620ad070f62775493f6eddce15bc264ed72508b01e0ce3ad95db66f649acd660eb047a507b70

  • memory/468-59-0x0000000000000000-mapping.dmp

  • memory/520-56-0x0000000075671000-0x0000000075673000-memory.dmp

    Filesize

    8KB