Analysis
-
max time kernel
165s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 05:33
Static task
static1
Behavioral task
behavioral1
Sample
2462954efad889ee0c73178d9d7c51d6a5078760a2dc3025a45e9b7ae1d8d782.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2462954efad889ee0c73178d9d7c51d6a5078760a2dc3025a45e9b7ae1d8d782.exe
Resource
win10v2004-20221111-en
General
-
Target
2462954efad889ee0c73178d9d7c51d6a5078760a2dc3025a45e9b7ae1d8d782.exe
-
Size
1.4MB
-
MD5
7530d3c0e0b2d245a78091014383f227
-
SHA1
413307782370f118d39db1b9c2146f36f9931757
-
SHA256
2462954efad889ee0c73178d9d7c51d6a5078760a2dc3025a45e9b7ae1d8d782
-
SHA512
16604e2dd3e7712c18a4a3058560d3852cc742c7861e7a43cf49d54b7dd9458067c06a07c588ddda2e57936f96eab73be4ed9ddfa67b206dc58c193797028a3d
-
SSDEEP
24576:PrJlZdeqazuBV5JBdcXxuDbdIbbgbw26VCl5ciXqE94H3k8xPttZ2:PrJlZMqvVLBehK4K9ZcJ3ksD2
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4016 zhab.exe 4836 33.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 2462954efad889ee0c73178d9d7c51d6a5078760a2dc3025a45e9b7ae1d8d782.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 33.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\qmgr.dll 33.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\33.exe 2462954efad889ee0c73178d9d7c51d6a5078760a2dc3025a45e9b7ae1d8d782.exe File created C:\Windows\zhab.exe 2462954efad889ee0c73178d9d7c51d6a5078760a2dc3025a45e9b7ae1d8d782.exe File opened for modification C:\Windows\zhab.exe 2462954efad889ee0c73178d9d7c51d6a5078760a2dc3025a45e9b7ae1d8d782.exe File created C:\Windows\__tmp_rar_sfx_access_check_240595312 2462954efad889ee0c73178d9d7c51d6a5078760a2dc3025a45e9b7ae1d8d782.exe File created C:\Windows\33.exe 2462954efad889ee0c73178d9d7c51d6a5078760a2dc3025a45e9b7ae1d8d782.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4016 zhab.exe 4016 zhab.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3240 wrote to memory of 4016 3240 2462954efad889ee0c73178d9d7c51d6a5078760a2dc3025a45e9b7ae1d8d782.exe 84 PID 3240 wrote to memory of 4016 3240 2462954efad889ee0c73178d9d7c51d6a5078760a2dc3025a45e9b7ae1d8d782.exe 84 PID 3240 wrote to memory of 4016 3240 2462954efad889ee0c73178d9d7c51d6a5078760a2dc3025a45e9b7ae1d8d782.exe 84 PID 3240 wrote to memory of 4836 3240 2462954efad889ee0c73178d9d7c51d6a5078760a2dc3025a45e9b7ae1d8d782.exe 85 PID 3240 wrote to memory of 4836 3240 2462954efad889ee0c73178d9d7c51d6a5078760a2dc3025a45e9b7ae1d8d782.exe 85 PID 3240 wrote to memory of 4836 3240 2462954efad889ee0c73178d9d7c51d6a5078760a2dc3025a45e9b7ae1d8d782.exe 85 PID 4836 wrote to memory of 3376 4836 33.exe 88 PID 4836 wrote to memory of 3376 4836 33.exe 88 PID 4836 wrote to memory of 3376 4836 33.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2462954efad889ee0c73178d9d7c51d6a5078760a2dc3025a45e9b7ae1d8d782.exe"C:\Users\Admin\AppData\Local\Temp\2462954efad889ee0c73178d9d7c51d6a5078760a2dc3025a45e9b7ae1d8d782.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\WINDOWS\zhab.exe"C:\WINDOWS\zhab.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4016
-
-
C:\WINDOWS\33.exe"C:\WINDOWS\33.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TempDel.bat" "3⤵PID:3376
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133B
MD59db547ff462ded9d4b498865e458daa1
SHA1e5ba84b60acd01fa0f8d8fe1edb94d957087c6a1
SHA2568f196da04156f6f4ca616487f642ed19391db34ac602fc1aaef9f612f25406e1
SHA512a410984d6fb57e7874d7a757f89845e98764d3e4b12d0a0a63525a6b322fdbf2715c8a43dd3eddbfeae3ab0f6bc6d807952976e3c56fbbff7ecfbdea038b1656
-
Filesize
13KB
MD515706b13f494532445fc4b82a6bb9307
SHA16b0eee851fc18088c5c92479656141e857f50bb2
SHA2563579a24c0e56df25ca909781448db207b4dd4ef6d4101a0c59e4167bd1d90380
SHA512440573b3aa0a1cc11a50f7340d9d5ab39c6c1c4327662145b5e2e3d8eecb7bbbccbb2d5118927459c324fb08cf2461df192f5f7d0257e7afbbba937f6f6e63ee
-
Filesize
1.3MB
MD56355f266515eb121cd65ea1277e7da15
SHA1c2edf4d87d68c96ba64cb2d281245e46691f79a6
SHA25636d430d363616e7c60f9333dc0ac26442b84b862717ae432e0581d8942809514
SHA512ecfa8ed832bf9b0ca0d3e4458d40c3d4023f64b9fe84f1c619a2fdd22aaa08bb4a6b69cb2e362ba47d9ab200116b81a7332de1d5944af3e374ab942b02a091d7
-
Filesize
13KB
MD515706b13f494532445fc4b82a6bb9307
SHA16b0eee851fc18088c5c92479656141e857f50bb2
SHA2563579a24c0e56df25ca909781448db207b4dd4ef6d4101a0c59e4167bd1d90380
SHA512440573b3aa0a1cc11a50f7340d9d5ab39c6c1c4327662145b5e2e3d8eecb7bbbccbb2d5118927459c324fb08cf2461df192f5f7d0257e7afbbba937f6f6e63ee
-
Filesize
1.3MB
MD56355f266515eb121cd65ea1277e7da15
SHA1c2edf4d87d68c96ba64cb2d281245e46691f79a6
SHA25636d430d363616e7c60f9333dc0ac26442b84b862717ae432e0581d8942809514
SHA512ecfa8ed832bf9b0ca0d3e4458d40c3d4023f64b9fe84f1c619a2fdd22aaa08bb4a6b69cb2e362ba47d9ab200116b81a7332de1d5944af3e374ab942b02a091d7