Analysis
-
max time kernel
151s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 23:28
Static task
static1
Behavioral task
behavioral1
Sample
b2d43eb955de682ebc678177ea390a4f905e2dbfe1cff93fee137413f6a6bbc0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b2d43eb955de682ebc678177ea390a4f905e2dbfe1cff93fee137413f6a6bbc0.exe
Resource
win10v2004-20221111-en
General
-
Target
b2d43eb955de682ebc678177ea390a4f905e2dbfe1cff93fee137413f6a6bbc0.exe
-
Size
148KB
-
MD5
e9dd7112c2ff1cf64002fc6fe139cb79
-
SHA1
c13acde170be20e99682f6bc3f128f6f0c004bd9
-
SHA256
b2d43eb955de682ebc678177ea390a4f905e2dbfe1cff93fee137413f6a6bbc0
-
SHA512
bd500433a99e482eeffb75fbebfe724a90c282ae431b74a313e6fc895c037334e61bbb6790dc58cf1993532bb1252d98e7a3d4c194b9aa56aa70227292e5c535
-
SSDEEP
3072:Qdo+sgRs59j/pvkqBBac+RAGq1bg7Yfgst6OzOS79pgRZkhQJAOAU4oQZiESV5n:eoZbj/pvkqBBac+RAGq1bZHtrzOS77kT
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b2d43eb955de682ebc678177ea390a4f905e2dbfe1cff93fee137413f6a6bbc0.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" pzvaig.exe -
Executes dropped EXE 1 IoCs
pid Process 948 pzvaig.exe -
Loads dropped DLL 2 IoCs
pid Process 1960 b2d43eb955de682ebc678177ea390a4f905e2dbfe1cff93fee137413f6a6bbc0.exe 1960 b2d43eb955de682ebc678177ea390a4f905e2dbfe1cff93fee137413f6a6bbc0.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /G" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /Z" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /f" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /o" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /N" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /x" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /D" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /Q" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /p" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /M" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /S" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /h" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /A" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /O" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /q" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /C" b2d43eb955de682ebc678177ea390a4f905e2dbfe1cff93fee137413f6a6bbc0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /n" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /w" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /i" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /I" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /v" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /L" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /Y" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /k" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /V" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /c" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /C" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /P" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /r" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /g" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /y" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /W" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /b" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /X" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /F" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /l" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /T" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /E" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /J" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /H" pzvaig.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ b2d43eb955de682ebc678177ea390a4f905e2dbfe1cff93fee137413f6a6bbc0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /U" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /a" pzvaig.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /j" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /m" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /d" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /z" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /B" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /u" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /K" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /e" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /s" pzvaig.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\pzvaig = "C:\\Users\\Admin\\pzvaig.exe /t" pzvaig.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1960 b2d43eb955de682ebc678177ea390a4f905e2dbfe1cff93fee137413f6a6bbc0.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe 948 pzvaig.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1960 b2d43eb955de682ebc678177ea390a4f905e2dbfe1cff93fee137413f6a6bbc0.exe 948 pzvaig.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1960 wrote to memory of 948 1960 b2d43eb955de682ebc678177ea390a4f905e2dbfe1cff93fee137413f6a6bbc0.exe 28 PID 1960 wrote to memory of 948 1960 b2d43eb955de682ebc678177ea390a4f905e2dbfe1cff93fee137413f6a6bbc0.exe 28 PID 1960 wrote to memory of 948 1960 b2d43eb955de682ebc678177ea390a4f905e2dbfe1cff93fee137413f6a6bbc0.exe 28 PID 1960 wrote to memory of 948 1960 b2d43eb955de682ebc678177ea390a4f905e2dbfe1cff93fee137413f6a6bbc0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2d43eb955de682ebc678177ea390a4f905e2dbfe1cff93fee137413f6a6bbc0.exe"C:\Users\Admin\AppData\Local\Temp\b2d43eb955de682ebc678177ea390a4f905e2dbfe1cff93fee137413f6a6bbc0.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\pzvaig.exe"C:\Users\Admin\pzvaig.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:948
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD555494a005286358f3e84f690eec9bc87
SHA1718dd87dd2d9e135b717cf86a3c1d29199185f24
SHA2561a1dde6e91c4f5c0f7047b446abf710cf993d7a287f4fa2cc325fcf8eb942f60
SHA512534ac0f222f50f2a007e0ad320211d05287cc11aa7ff5d170f89301c0b4268333bd5c4a392cd7ea2a21c7d25470fe89e74276c238f8393a21d7381236082a7df
-
Filesize
148KB
MD555494a005286358f3e84f690eec9bc87
SHA1718dd87dd2d9e135b717cf86a3c1d29199185f24
SHA2561a1dde6e91c4f5c0f7047b446abf710cf993d7a287f4fa2cc325fcf8eb942f60
SHA512534ac0f222f50f2a007e0ad320211d05287cc11aa7ff5d170f89301c0b4268333bd5c4a392cd7ea2a21c7d25470fe89e74276c238f8393a21d7381236082a7df
-
Filesize
148KB
MD555494a005286358f3e84f690eec9bc87
SHA1718dd87dd2d9e135b717cf86a3c1d29199185f24
SHA2561a1dde6e91c4f5c0f7047b446abf710cf993d7a287f4fa2cc325fcf8eb942f60
SHA512534ac0f222f50f2a007e0ad320211d05287cc11aa7ff5d170f89301c0b4268333bd5c4a392cd7ea2a21c7d25470fe89e74276c238f8393a21d7381236082a7df
-
Filesize
148KB
MD555494a005286358f3e84f690eec9bc87
SHA1718dd87dd2d9e135b717cf86a3c1d29199185f24
SHA2561a1dde6e91c4f5c0f7047b446abf710cf993d7a287f4fa2cc325fcf8eb942f60
SHA512534ac0f222f50f2a007e0ad320211d05287cc11aa7ff5d170f89301c0b4268333bd5c4a392cd7ea2a21c7d25470fe89e74276c238f8393a21d7381236082a7df