Analysis

  • max time kernel
    151s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 19:50

General

  • Target

    f4bfa30450197d90a5bbb5bc8eb0adae466350c4aefe004b56945d262eaf384e.exe

  • Size

    280KB

  • MD5

    0252bfd7bb98bef27bce1ab573108992

  • SHA1

    eb70f5aaf8c4c175a34fe6092c1bb341ec2b4e68

  • SHA256

    f4bfa30450197d90a5bbb5bc8eb0adae466350c4aefe004b56945d262eaf384e

  • SHA512

    7c92bcae3a183836c544d009b206b7a844e52924df0b36a5b6964328d2e493331c53d70d8f598c05f33eb2bd231277e880fb357fd7a7d52a19d173d29692b3ab

  • SSDEEP

    6144:KIVIpydVsZyxyK5R8GYKi1Xfvs1tzH51t+ewSReXNL/B:ruydfiebOTB

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4bfa30450197d90a5bbb5bc8eb0adae466350c4aefe004b56945d262eaf384e.exe
    "C:\Users\Admin\AppData\Local\Temp\f4bfa30450197d90a5bbb5bc8eb0adae466350c4aefe004b56945d262eaf384e.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3340
    • C:\Users\Admin\zeomaa.exe
      "C:\Users\Admin\zeomaa.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4868

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\zeomaa.exe

          Filesize

          280KB

          MD5

          ebf67c118bf946f9606b606a87423b72

          SHA1

          a312240572ea60e9ed136a753095ad4a4fa55040

          SHA256

          51cdeab5c1244c7e964d7b453adf29714dc80f8c4fe99844053acc44de0e3b87

          SHA512

          0f620732cd70edea21d39607c212722d6dadd527b8e935f8a3fe0d8a2bb15bc96e8acac3e5b325b406636229daceb36f39b70314821d453af30fd3eb15450fb7

        • C:\Users\Admin\zeomaa.exe

          Filesize

          280KB

          MD5

          ebf67c118bf946f9606b606a87423b72

          SHA1

          a312240572ea60e9ed136a753095ad4a4fa55040

          SHA256

          51cdeab5c1244c7e964d7b453adf29714dc80f8c4fe99844053acc44de0e3b87

          SHA512

          0f620732cd70edea21d39607c212722d6dadd527b8e935f8a3fe0d8a2bb15bc96e8acac3e5b325b406636229daceb36f39b70314821d453af30fd3eb15450fb7