Analysis

  • max time kernel
    188s
  • max time network
    187s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 23:00

General

  • Target

    a3d2ca4a5da6f91dfd236819186795e17da1718d52b749d7ad54f6b46b91e948.exe

  • Size

    108KB

  • MD5

    4fe03c5f448407797e32391fc1121a7d

  • SHA1

    a329a1afc4ea7912ca3f0d9310b607bed6ff7117

  • SHA256

    a3d2ca4a5da6f91dfd236819186795e17da1718d52b749d7ad54f6b46b91e948

  • SHA512

    71b55cca355ea9a59846fff864b2414a55db9e0d402e170d50a4abb4d8367843e57da07a0e1f0440751b0b67de1985b4da2c8e8b4a2fdc85c842d4ac0e76923b

  • SSDEEP

    1536:sJtVIKiB6oQ7Lh5+sXmNt0ttiPXLq0zTrkB:MUmoIeZt1XTzToB

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3d2ca4a5da6f91dfd236819186795e17da1718d52b749d7ad54f6b46b91e948.exe
    "C:\Users\Admin\AppData\Local\Temp\a3d2ca4a5da6f91dfd236819186795e17da1718d52b749d7ad54f6b46b91e948.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:952
    • C:\Users\Admin\zozuq.exe
      "C:\Users\Admin\zozuq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3264

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\zozuq.exe

    Filesize

    108KB

    MD5

    7570e2eee4c5d09c086beffe3e86f958

    SHA1

    5ddfa16789230a4d5993b4d65867764fea541cfb

    SHA256

    9140ebcc28250d06f2dce47f8b8e939f28b8c564857f9e2a374e262ab436b131

    SHA512

    487c4fd5f2b73a820aa0a5d5ecd87809484c5856600c3cb58f465dcba593a1f9b75ea0717bcbd850fba1ecf152c58dbd6e0885222944946b5d1366c8f74abb4c

  • C:\Users\Admin\zozuq.exe

    Filesize

    108KB

    MD5

    7570e2eee4c5d09c086beffe3e86f958

    SHA1

    5ddfa16789230a4d5993b4d65867764fea541cfb

    SHA256

    9140ebcc28250d06f2dce47f8b8e939f28b8c564857f9e2a374e262ab436b131

    SHA512

    487c4fd5f2b73a820aa0a5d5ecd87809484c5856600c3cb58f465dcba593a1f9b75ea0717bcbd850fba1ecf152c58dbd6e0885222944946b5d1366c8f74abb4c