Analysis
-
max time kernel
248s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 17:19
Static task
static1
Behavioral task
behavioral1
Sample
a7bb0cd88fa3f53e8644a7f35c739014fd93fa632e8c27f30cddbdce099bfdde.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a7bb0cd88fa3f53e8644a7f35c739014fd93fa632e8c27f30cddbdce099bfdde.exe
Resource
win10v2004-20221111-en
General
-
Target
a7bb0cd88fa3f53e8644a7f35c739014fd93fa632e8c27f30cddbdce099bfdde.exe
-
Size
240KB
-
MD5
81767ebcc9384a8b6cee9900a7c6eed1
-
SHA1
1ceb5330fd9ba4f40bdd6d57b934c1129c8efe16
-
SHA256
a7bb0cd88fa3f53e8644a7f35c739014fd93fa632e8c27f30cddbdce099bfdde
-
SHA512
53e011876a6bc480266a6339b671776cda46b1a709b8913ea3773cd84bf7392f05b27e88c230d797bc206cb58651bfec05d3734eec1fdf04d2f04ed600fcb83e
-
SSDEEP
6144:Sd3dwqsNTNEXGlQR58EqxF6snji81RUinKq3aEESliDng:SpdQKjeaEEpc
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" a7bb0cd88fa3f53e8644a7f35c739014fd93fa632e8c27f30cddbdce099bfdde.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zuazi.exe -
Executes dropped EXE 1 IoCs
pid Process 468 zuazi.exe -
Loads dropped DLL 2 IoCs
pid Process 520 a7bb0cd88fa3f53e8644a7f35c739014fd93fa632e8c27f30cddbdce099bfdde.exe 520 a7bb0cd88fa3f53e8644a7f35c739014fd93fa632e8c27f30cddbdce099bfdde.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ a7bb0cd88fa3f53e8644a7f35c739014fd93fa632e8c27f30cddbdce099bfdde.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /y" zuazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /p" zuazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /s" zuazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /f" zuazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /o" zuazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /a" zuazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /k" zuazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /h" zuazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /w" zuazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /g" zuazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /c" zuazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /e" a7bb0cd88fa3f53e8644a7f35c739014fd93fa632e8c27f30cddbdce099bfdde.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /u" zuazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /b" zuazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /q" zuazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /r" zuazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /x" zuazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /d" zuazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /t" zuazi.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ zuazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /l" zuazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /i" zuazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /v" zuazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /n" zuazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /e" zuazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /j" zuazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /m" zuazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\zuazi = "C:\\Users\\Admin\\zuazi.exe /z" zuazi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 520 a7bb0cd88fa3f53e8644a7f35c739014fd93fa632e8c27f30cddbdce099bfdde.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe 468 zuazi.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 520 a7bb0cd88fa3f53e8644a7f35c739014fd93fa632e8c27f30cddbdce099bfdde.exe 468 zuazi.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 520 wrote to memory of 468 520 a7bb0cd88fa3f53e8644a7f35c739014fd93fa632e8c27f30cddbdce099bfdde.exe 28 PID 520 wrote to memory of 468 520 a7bb0cd88fa3f53e8644a7f35c739014fd93fa632e8c27f30cddbdce099bfdde.exe 28 PID 520 wrote to memory of 468 520 a7bb0cd88fa3f53e8644a7f35c739014fd93fa632e8c27f30cddbdce099bfdde.exe 28 PID 520 wrote to memory of 468 520 a7bb0cd88fa3f53e8644a7f35c739014fd93fa632e8c27f30cddbdce099bfdde.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7bb0cd88fa3f53e8644a7f35c739014fd93fa632e8c27f30cddbdce099bfdde.exe"C:\Users\Admin\AppData\Local\Temp\a7bb0cd88fa3f53e8644a7f35c739014fd93fa632e8c27f30cddbdce099bfdde.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\zuazi.exe"C:\Users\Admin\zuazi.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:468
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5c69e9bcaab7d5f8a374972008bcd9451
SHA14b631e9f6b2515081328bc421302442f9d6c4313
SHA256a0679945f68b4dec75c046098078845dfae45abd88b7654b9a00a5b466f837d8
SHA5125f039f14c976c0ed9abb81d7351c8a7057cfb408f3b3d692f6f5620ad070f62775493f6eddce15bc264ed72508b01e0ce3ad95db66f649acd660eb047a507b70
-
Filesize
240KB
MD5c69e9bcaab7d5f8a374972008bcd9451
SHA14b631e9f6b2515081328bc421302442f9d6c4313
SHA256a0679945f68b4dec75c046098078845dfae45abd88b7654b9a00a5b466f837d8
SHA5125f039f14c976c0ed9abb81d7351c8a7057cfb408f3b3d692f6f5620ad070f62775493f6eddce15bc264ed72508b01e0ce3ad95db66f649acd660eb047a507b70
-
Filesize
240KB
MD5c69e9bcaab7d5f8a374972008bcd9451
SHA14b631e9f6b2515081328bc421302442f9d6c4313
SHA256a0679945f68b4dec75c046098078845dfae45abd88b7654b9a00a5b466f837d8
SHA5125f039f14c976c0ed9abb81d7351c8a7057cfb408f3b3d692f6f5620ad070f62775493f6eddce15bc264ed72508b01e0ce3ad95db66f649acd660eb047a507b70
-
Filesize
240KB
MD5c69e9bcaab7d5f8a374972008bcd9451
SHA14b631e9f6b2515081328bc421302442f9d6c4313
SHA256a0679945f68b4dec75c046098078845dfae45abd88b7654b9a00a5b466f837d8
SHA5125f039f14c976c0ed9abb81d7351c8a7057cfb408f3b3d692f6f5620ad070f62775493f6eddce15bc264ed72508b01e0ce3ad95db66f649acd660eb047a507b70