Analysis
-
max time kernel
167s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
fbf5ec63187aa100c3f3f70d7353cc410f0ecd904e2daf2c4217ee2f4c820de4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fbf5ec63187aa100c3f3f70d7353cc410f0ecd904e2daf2c4217ee2f4c820de4.exe
Resource
win10v2004-20220812-en
General
-
Target
fbf5ec63187aa100c3f3f70d7353cc410f0ecd904e2daf2c4217ee2f4c820de4.exe
-
Size
156KB
-
MD5
f111dffbff9a7498c87afbcea8837fe8
-
SHA1
c872cd7a2ba957ad73a4777a507237d334780614
-
SHA256
fbf5ec63187aa100c3f3f70d7353cc410f0ecd904e2daf2c4217ee2f4c820de4
-
SHA512
eac5b74f6cf4fe4dc573a5dd0beb297602c815aa4e8e477f5e04b5999070ae19bd5ab4586f3fc49c7413c5b4db1af7bca90d4622b23ab1a45ea6f7734b12ad62
-
SSDEEP
3072:QBd1HE2MtU7Qv0w4ZRRQMMDwtIMCeFP4ANA4oQZiEbL:Sd5E2R7Qvb4tQTaCeFP4A+WN
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fbf5ec63187aa100c3f3f70d7353cc410f0ecd904e2daf2c4217ee2f4c820de4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gzvaul.exe -
Executes dropped EXE 1 IoCs
pid Process 2976 gzvaul.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation fbf5ec63187aa100c3f3f70d7353cc410f0ecd904e2daf2c4217ee2f4c820de4.exe -
Adds Run key to start application 2 TTPs 55 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /m" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /w" fbf5ec63187aa100c3f3f70d7353cc410f0ecd904e2daf2c4217ee2f4c820de4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /z" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /W" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /L" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /n" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /P" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /N" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /H" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /a" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /D" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /G" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /l" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /C" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /u" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /b" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /i" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /s" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /M" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /X" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /y" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /F" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /w" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /Q" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /o" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /c" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /v" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /T" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /p" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /e" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /O" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /V" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /A" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /B" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /I" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /Y" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /j" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /h" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /d" gzvaul.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ fbf5ec63187aa100c3f3f70d7353cc410f0ecd904e2daf2c4217ee2f4c820de4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /q" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /g" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /t" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /x" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /R" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /f" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /k" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /S" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /J" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /r" gzvaul.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /E" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /U" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /K" gzvaul.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gzvaul = "C:\\Users\\Admin\\gzvaul.exe /Z" gzvaul.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1920 fbf5ec63187aa100c3f3f70d7353cc410f0ecd904e2daf2c4217ee2f4c820de4.exe 1920 fbf5ec63187aa100c3f3f70d7353cc410f0ecd904e2daf2c4217ee2f4c820de4.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe 2976 gzvaul.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1920 fbf5ec63187aa100c3f3f70d7353cc410f0ecd904e2daf2c4217ee2f4c820de4.exe 2976 gzvaul.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1920 wrote to memory of 2976 1920 fbf5ec63187aa100c3f3f70d7353cc410f0ecd904e2daf2c4217ee2f4c820de4.exe 80 PID 1920 wrote to memory of 2976 1920 fbf5ec63187aa100c3f3f70d7353cc410f0ecd904e2daf2c4217ee2f4c820de4.exe 80 PID 1920 wrote to memory of 2976 1920 fbf5ec63187aa100c3f3f70d7353cc410f0ecd904e2daf2c4217ee2f4c820de4.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbf5ec63187aa100c3f3f70d7353cc410f0ecd904e2daf2c4217ee2f4c820de4.exe"C:\Users\Admin\AppData\Local\Temp\fbf5ec63187aa100c3f3f70d7353cc410f0ecd904e2daf2c4217ee2f4c820de4.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\gzvaul.exe"C:\Users\Admin\gzvaul.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2976
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD54530f4312c6c5578e834c20de7ad7229
SHA148804b64b353ed0970c3ba6968c503ab891e4f62
SHA25669ab66e8940bdf874e9bd9d249bd971d484e74373ebccb69ffcf8cd2d73d2fc7
SHA512c9d5439985594627d82b9a60e93b690fede46cd32d9af550caaea6e47b934e4ffda4853045b2e9543cc9ae3e02e5da5943500e911857f81bfbd0065e1d1e2e33
-
Filesize
156KB
MD54530f4312c6c5578e834c20de7ad7229
SHA148804b64b353ed0970c3ba6968c503ab891e4f62
SHA25669ab66e8940bdf874e9bd9d249bd971d484e74373ebccb69ffcf8cd2d73d2fc7
SHA512c9d5439985594627d82b9a60e93b690fede46cd32d9af550caaea6e47b934e4ffda4853045b2e9543cc9ae3e02e5da5943500e911857f81bfbd0065e1d1e2e33