Analysis
-
max time kernel
128s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 09:30
Static task
static1
Behavioral task
behavioral1
Sample
ae7da76b3c43003a28e047ea732ca43ca1e60a93125bcccec7cbabea01503380.exe
Resource
win7-20220812-en
General
-
Target
ae7da76b3c43003a28e047ea732ca43ca1e60a93125bcccec7cbabea01503380.exe
-
Size
287KB
-
MD5
1433398929114793884388a444e30cb0
-
SHA1
6c5e225c71db39bbc36a14e90a033d28f80bdca8
-
SHA256
ae7da76b3c43003a28e047ea732ca43ca1e60a93125bcccec7cbabea01503380
-
SHA512
ccfa72fe409ab15c2b826049356fb4fbe71ae5dedb62db3b8e4231cf8c362d27d734852080ca9ee3cc25d98b2b3b06ed98c6d0c28f4c0aa9936bf3656ce2325e
-
SSDEEP
6144:99mnus6PYCTlUVT4pSMculOPyv7a4xveBq0XT8hkgRSU72aYwUU:uL6PtW4pjDkU9x2s0QWs7owL
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1680 zlo2.exe 3328 vpnium.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation ae7da76b3c43003a28e047ea732ca43ca1e60a93125bcccec7cbabea01503380.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 whatismyip.akamai.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier zlo2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 zlo2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString zlo2.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1680 zlo2.exe 1680 zlo2.exe 1680 zlo2.exe 1680 zlo2.exe 1680 zlo2.exe 1680 zlo2.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3328 vpnium.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3328 vpnium.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4868 wrote to memory of 1680 4868 ae7da76b3c43003a28e047ea732ca43ca1e60a93125bcccec7cbabea01503380.exe 82 PID 4868 wrote to memory of 1680 4868 ae7da76b3c43003a28e047ea732ca43ca1e60a93125bcccec7cbabea01503380.exe 82 PID 4868 wrote to memory of 1680 4868 ae7da76b3c43003a28e047ea732ca43ca1e60a93125bcccec7cbabea01503380.exe 82 PID 4868 wrote to memory of 3328 4868 ae7da76b3c43003a28e047ea732ca43ca1e60a93125bcccec7cbabea01503380.exe 83 PID 4868 wrote to memory of 3328 4868 ae7da76b3c43003a28e047ea732ca43ca1e60a93125bcccec7cbabea01503380.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae7da76b3c43003a28e047ea732ca43ca1e60a93125bcccec7cbabea01503380.exe"C:\Users\Admin\AppData\Local\Temp\ae7da76b3c43003a28e047ea732ca43ca1e60a93125bcccec7cbabea01503380.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\zlo2.exe"C:\Users\Admin\AppData\Local\Temp\zlo2.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1680
-
-
C:\Users\Admin\AppData\Local\Temp\vpnium.exe"C:\Users\Admin\AppData\Local\Temp\vpnium.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3328
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243KB
MD5fd3c4a2abcf3ade19747a5bbf9cabe13
SHA1ed7734b9725f2b0a4c07db8dcc12043c1c8d8941
SHA25632e1ff85e3e2bf53c740ccc7c42895bce60bce83e46c47b0826c81a336f15c42
SHA51247b383173535fb5cbbc4598681140ac6e8b80b4adbc80753d9df541073c44d6b5a384421e42aeb8d7d514e136f9207238c241200619bd76a271d7436f2a9e44c
-
Filesize
243KB
MD5fd3c4a2abcf3ade19747a5bbf9cabe13
SHA1ed7734b9725f2b0a4c07db8dcc12043c1c8d8941
SHA25632e1ff85e3e2bf53c740ccc7c42895bce60bce83e46c47b0826c81a336f15c42
SHA51247b383173535fb5cbbc4598681140ac6e8b80b4adbc80753d9df541073c44d6b5a384421e42aeb8d7d514e136f9207238c241200619bd76a271d7436f2a9e44c
-
Filesize
63KB
MD564ee6a336c3d8462df980eab38288aa8
SHA1042a9427d4b4b81d97e850714647b9277b2066e5
SHA256619ba8ba6bd272f9c0da176baad1e149d353ac6a571ffc67feaabbf4e5cacfdb
SHA512535d8e6223d2c788d5248edaa42b35365ee48565e9e4fedcc81608b4e6d2f56c0bee7f07e4ed16eb658b22aaeb9673aaaa5e46449f0654710e6a488d962ae4ed
-
Filesize
63KB
MD564ee6a336c3d8462df980eab38288aa8
SHA1042a9427d4b4b81d97e850714647b9277b2066e5
SHA256619ba8ba6bd272f9c0da176baad1e149d353ac6a571ffc67feaabbf4e5cacfdb
SHA512535d8e6223d2c788d5248edaa42b35365ee48565e9e4fedcc81608b4e6d2f56c0bee7f07e4ed16eb658b22aaeb9673aaaa5e46449f0654710e6a488d962ae4ed