Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 23:38
Static task
static1
Behavioral task
behavioral1
Sample
9db7b6c785dfe553776916a91fbc18416055f1735fa7e1428feed7dea9afab6e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9db7b6c785dfe553776916a91fbc18416055f1735fa7e1428feed7dea9afab6e.exe
Resource
win10v2004-20220812-en
General
-
Target
9db7b6c785dfe553776916a91fbc18416055f1735fa7e1428feed7dea9afab6e.exe
-
Size
284KB
-
MD5
5897f884e2ff480b59ab3ce3a3c784f6
-
SHA1
4ee772d819de27618fb74214d58dfc980ab408ba
-
SHA256
9db7b6c785dfe553776916a91fbc18416055f1735fa7e1428feed7dea9afab6e
-
SHA512
47ed906135624b66097e7c3e4f2213ce5270532d6664ba399a55a58165705091e9356874430a9661acd37e207c3930f051b7412921517e888af33777d039e723
-
SSDEEP
6144:RP9qiyChL5Rjda3P/fis6Do/uP+tFb84ly7a7:99qiyCF5xI3PH96DoWPYb8Y
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 9db7b6c785dfe553776916a91fbc18416055f1735fa7e1428feed7dea9afab6e.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lzjiil.exe -
Executes dropped EXE 1 IoCs
pid Process 1196 lzjiil.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 9db7b6c785dfe553776916a91fbc18416055f1735fa7e1428feed7dea9afab6e.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 9db7b6c785dfe553776916a91fbc18416055f1735fa7e1428feed7dea9afab6e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /h" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /l" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /O" lzjiil.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /d" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /V" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /B" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /n" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /v" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /W" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /M" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /t" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /G" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /N" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /H" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /E" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /P" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /e" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /S" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /L" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /k" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /i" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /q" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /Z" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /u" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /A" 9db7b6c785dfe553776916a91fbc18416055f1735fa7e1428feed7dea9afab6e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /a" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /g" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /R" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /T" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /J" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /x" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /U" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /s" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /Y" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /o" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /C" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /y" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /j" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /w" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /r" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /K" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /Q" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /p" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /I" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /b" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /m" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /c" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /f" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /A" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /F" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /X" lzjiil.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lzjiil = "C:\\Users\\Admin\\lzjiil.exe /z" lzjiil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1508 9db7b6c785dfe553776916a91fbc18416055f1735fa7e1428feed7dea9afab6e.exe 1508 9db7b6c785dfe553776916a91fbc18416055f1735fa7e1428feed7dea9afab6e.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe 1196 lzjiil.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1508 9db7b6c785dfe553776916a91fbc18416055f1735fa7e1428feed7dea9afab6e.exe 1196 lzjiil.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1508 wrote to memory of 1196 1508 9db7b6c785dfe553776916a91fbc18416055f1735fa7e1428feed7dea9afab6e.exe 80 PID 1508 wrote to memory of 1196 1508 9db7b6c785dfe553776916a91fbc18416055f1735fa7e1428feed7dea9afab6e.exe 80 PID 1508 wrote to memory of 1196 1508 9db7b6c785dfe553776916a91fbc18416055f1735fa7e1428feed7dea9afab6e.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\9db7b6c785dfe553776916a91fbc18416055f1735fa7e1428feed7dea9afab6e.exe"C:\Users\Admin\AppData\Local\Temp\9db7b6c785dfe553776916a91fbc18416055f1735fa7e1428feed7dea9afab6e.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\lzjiil.exe"C:\Users\Admin\lzjiil.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1196
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD5ff31e926c1f4b162fb5042f70cc3d3e7
SHA1a4b3ab1dffcb75a14424336ff15951b59d3ee718
SHA2564e79d396cca62edcfebe3fb0d7d852fe43ad02dc3141fb9f991b002f91d63751
SHA512d5fcc4b54c46d31427a1a0c12bac71ec4c544a9a8e83bdaa4263b53901aeebd1229ddfac16ebc994d4efad2e021ee90b220a62e112005c8b3261228732f1e853
-
Filesize
284KB
MD5ff31e926c1f4b162fb5042f70cc3d3e7
SHA1a4b3ab1dffcb75a14424336ff15951b59d3ee718
SHA2564e79d396cca62edcfebe3fb0d7d852fe43ad02dc3141fb9f991b002f91d63751
SHA512d5fcc4b54c46d31427a1a0c12bac71ec4c544a9a8e83bdaa4263b53901aeebd1229ddfac16ebc994d4efad2e021ee90b220a62e112005c8b3261228732f1e853