Analysis

  • max time kernel
    224s
  • max time network
    173s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 17:25

General

  • Target

    916fd2a933b2a8a0e166c8e2caf8bd4015c71f8797b45731f1ffddd1e09edb47.exe

  • Size

    156KB

  • MD5

    9131f9599055a22c6a2bbc35a91c5dea

  • SHA1

    04fdc576e54c9291824321d2cfc077dcd2ea8110

  • SHA256

    916fd2a933b2a8a0e166c8e2caf8bd4015c71f8797b45731f1ffddd1e09edb47

  • SHA512

    da3c197b38da26f09f8926dbeb031c7f1a4a2504064c2ed055f49da4cfb8a997b9a2da2342ba012bf4287dfe3defb0249f174019c2d8298f9ebacf1b1754061a

  • SSDEEP

    3072:EGoe5g+GwD8w2+d5bWIrJ4E5n41sSLeH8ozK/d/18Ulyc4oQZiE1Q:E2WIrJ4E5n41pVN/jh7WA

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 49 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\916fd2a933b2a8a0e166c8e2caf8bd4015c71f8797b45731f1ffddd1e09edb47.exe
    "C:\Users\Admin\AppData\Local\Temp\916fd2a933b2a8a0e166c8e2caf8bd4015c71f8797b45731f1ffddd1e09edb47.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Users\Admin\zoefo.exe
      "C:\Users\Admin\zoefo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:564

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\zoefo.exe

    Filesize

    156KB

    MD5

    721bc82aed62bb0264e568adfbbd0acd

    SHA1

    bf85ff6187ff0b0ac9adf061f94efa0f5efa9d46

    SHA256

    001daf1202147b0033a8f7cb2c56a1abbd7203c783215b01b6c416cce80f7727

    SHA512

    1b69e1f83fdb1e587b508b722e4b89712c7e1a399b07b53f900fc64117fd9f1f44f041cd5d7d386dc1643aa786cd6b6011f0e317deb65246dfa413059658c3a7

  • C:\Users\Admin\zoefo.exe

    Filesize

    156KB

    MD5

    721bc82aed62bb0264e568adfbbd0acd

    SHA1

    bf85ff6187ff0b0ac9adf061f94efa0f5efa9d46

    SHA256

    001daf1202147b0033a8f7cb2c56a1abbd7203c783215b01b6c416cce80f7727

    SHA512

    1b69e1f83fdb1e587b508b722e4b89712c7e1a399b07b53f900fc64117fd9f1f44f041cd5d7d386dc1643aa786cd6b6011f0e317deb65246dfa413059658c3a7

  • \Users\Admin\zoefo.exe

    Filesize

    156KB

    MD5

    721bc82aed62bb0264e568adfbbd0acd

    SHA1

    bf85ff6187ff0b0ac9adf061f94efa0f5efa9d46

    SHA256

    001daf1202147b0033a8f7cb2c56a1abbd7203c783215b01b6c416cce80f7727

    SHA512

    1b69e1f83fdb1e587b508b722e4b89712c7e1a399b07b53f900fc64117fd9f1f44f041cd5d7d386dc1643aa786cd6b6011f0e317deb65246dfa413059658c3a7

  • \Users\Admin\zoefo.exe

    Filesize

    156KB

    MD5

    721bc82aed62bb0264e568adfbbd0acd

    SHA1

    bf85ff6187ff0b0ac9adf061f94efa0f5efa9d46

    SHA256

    001daf1202147b0033a8f7cb2c56a1abbd7203c783215b01b6c416cce80f7727

    SHA512

    1b69e1f83fdb1e587b508b722e4b89712c7e1a399b07b53f900fc64117fd9f1f44f041cd5d7d386dc1643aa786cd6b6011f0e317deb65246dfa413059658c3a7

  • memory/1480-56-0x0000000076581000-0x0000000076583000-memory.dmp

    Filesize

    8KB