Analysis
-
max time kernel
150s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 00:40
Static task
static1
Behavioral task
behavioral1
Sample
b00203b36e082511401f0cdc9fe1a77f29cf009742c97193631cc4bcc8063d2d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b00203b36e082511401f0cdc9fe1a77f29cf009742c97193631cc4bcc8063d2d.exe
Resource
win10v2004-20221111-en
General
-
Target
b00203b36e082511401f0cdc9fe1a77f29cf009742c97193631cc4bcc8063d2d.exe
-
Size
56KB
-
MD5
b6ed03a4feb3598b66f461866df00ddd
-
SHA1
83d887aa02c85450e9fd6785e0648beb2dee8a86
-
SHA256
b00203b36e082511401f0cdc9fe1a77f29cf009742c97193631cc4bcc8063d2d
-
SHA512
6763ce204770dd48d83421ffb9ab41968511a60051fadb0bb1459a881950d3c20cb1c53c1d834f75eb27e7550f7fbc35a22184f4daafe3d9ddcc5a6cfb645bbc
-
SSDEEP
768:HGHJEIxw3mHxemBUMLnmzzQxINFIk2d+1FIkRc7NKecMkNYn6WyzZspG6P8Lx4N8:HGloFH7ShdLw00NMyBq6ZxH0P6D53T7
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zeami.exe -
Executes dropped EXE 1 IoCs
pid Process 1292 zeami.exe -
Loads dropped DLL 2 IoCs
pid Process 1724 b00203b36e082511401f0cdc9fe1a77f29cf009742c97193631cc4bcc8063d2d.exe 1724 b00203b36e082511401f0cdc9fe1a77f29cf009742c97193631cc4bcc8063d2d.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /I" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /k" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /Y" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /z" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /p" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /P" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /J" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /q" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /w" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /y" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /d" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /h" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /H" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /A" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /W" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /t" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /U" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /c" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /B" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /D" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /Q" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /O" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /j" zeami.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /n" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /u" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /s" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /S" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /r" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /o" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /N" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /i" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /E" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /V" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /G" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /g" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /l" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /m" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /a" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /Z" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /R" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /L" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /M" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /C" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /f" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /X" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /F" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /K" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /x" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /e" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /b" zeami.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\zeami = "C:\\Users\\Admin\\zeami.exe /T" zeami.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe 1292 zeami.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1724 b00203b36e082511401f0cdc9fe1a77f29cf009742c97193631cc4bcc8063d2d.exe 1292 zeami.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1292 1724 b00203b36e082511401f0cdc9fe1a77f29cf009742c97193631cc4bcc8063d2d.exe 27 PID 1724 wrote to memory of 1292 1724 b00203b36e082511401f0cdc9fe1a77f29cf009742c97193631cc4bcc8063d2d.exe 27 PID 1724 wrote to memory of 1292 1724 b00203b36e082511401f0cdc9fe1a77f29cf009742c97193631cc4bcc8063d2d.exe 27 PID 1724 wrote to memory of 1292 1724 b00203b36e082511401f0cdc9fe1a77f29cf009742c97193631cc4bcc8063d2d.exe 27 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26 PID 1292 wrote to memory of 1724 1292 zeami.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\b00203b36e082511401f0cdc9fe1a77f29cf009742c97193631cc4bcc8063d2d.exe"C:\Users\Admin\AppData\Local\Temp\b00203b36e082511401f0cdc9fe1a77f29cf009742c97193631cc4bcc8063d2d.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\zeami.exe"C:\Users\Admin\zeami.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD53dedb8bd09f910ec4094b872890bfe9b
SHA186f2703b2589e4cb1cf36ac27e36ab28fadb0ae5
SHA256f7ff966fb73106bb0203cb8546c68b9cc2764eedb05880ede0c1466fff3c458f
SHA5129e3fe20cd89d99a9ffdf4a063df0901c02a7e479fade221b1c6dcd1b247dd2da22b8909be8283caa34193eee402bbed268a14d2a65da565a02c8da1a279e4f04
-
Filesize
56KB
MD53dedb8bd09f910ec4094b872890bfe9b
SHA186f2703b2589e4cb1cf36ac27e36ab28fadb0ae5
SHA256f7ff966fb73106bb0203cb8546c68b9cc2764eedb05880ede0c1466fff3c458f
SHA5129e3fe20cd89d99a9ffdf4a063df0901c02a7e479fade221b1c6dcd1b247dd2da22b8909be8283caa34193eee402bbed268a14d2a65da565a02c8da1a279e4f04
-
Filesize
56KB
MD53dedb8bd09f910ec4094b872890bfe9b
SHA186f2703b2589e4cb1cf36ac27e36ab28fadb0ae5
SHA256f7ff966fb73106bb0203cb8546c68b9cc2764eedb05880ede0c1466fff3c458f
SHA5129e3fe20cd89d99a9ffdf4a063df0901c02a7e479fade221b1c6dcd1b247dd2da22b8909be8283caa34193eee402bbed268a14d2a65da565a02c8da1a279e4f04
-
Filesize
56KB
MD53dedb8bd09f910ec4094b872890bfe9b
SHA186f2703b2589e4cb1cf36ac27e36ab28fadb0ae5
SHA256f7ff966fb73106bb0203cb8546c68b9cc2764eedb05880ede0c1466fff3c458f
SHA5129e3fe20cd89d99a9ffdf4a063df0901c02a7e479fade221b1c6dcd1b247dd2da22b8909be8283caa34193eee402bbed268a14d2a65da565a02c8da1a279e4f04