Analysis

  • max time kernel
    156s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 10:30

General

  • Target

    c46a82dde1c74f6050d3a1e5010d91c2635365ceed0562d3b55fca3126efaa67.exe

  • Size

    236KB

  • MD5

    5924f559c1eeae3d51db9defc440132b

  • SHA1

    73dd288f62b098ab4b11e3bd678115d96c44b65a

  • SHA256

    c46a82dde1c74f6050d3a1e5010d91c2635365ceed0562d3b55fca3126efaa67

  • SHA512

    28beb3fad7842c32eee168345b015b3574ec73012ca23bc936e3b5c990358b4bb636e2511c887bd8b8968efb093baa53d12eb8dd00a9f7339122b13efd04f05c

  • SSDEEP

    6144:ImaKCiUNxlBDe2WmHioZW+ZigxpEJAYyXSWIc9sKB+:PkLlBDeLmHioZWEigxpYAYlbc9TB

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c46a82dde1c74f6050d3a1e5010d91c2635365ceed0562d3b55fca3126efaa67.exe
    "C:\Users\Admin\AppData\Local\Temp\c46a82dde1c74f6050d3a1e5010d91c2635365ceed0562d3b55fca3126efaa67.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4232
    • C:\Users\Admin\zuuzo.exe
      "C:\Users\Admin\zuuzo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1972

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\zuuzo.exe

    Filesize

    236KB

    MD5

    348166abc611f89db3a7e2b74f18d979

    SHA1

    2774c14458111c436f4f545b8e8aa09c86ffe913

    SHA256

    ce9eeca6a266a432b961ad3f42da51afc32b487ae48fd5850ed9c513c0043559

    SHA512

    2233dfc4bc22fb75d96273f549911a748205d7d689f31a9280944c0828b4a8a2b146b5891c9432856100cc82219323a15701d41696b677ada42ea6d2b696961a

  • C:\Users\Admin\zuuzo.exe

    Filesize

    236KB

    MD5

    348166abc611f89db3a7e2b74f18d979

    SHA1

    2774c14458111c436f4f545b8e8aa09c86ffe913

    SHA256

    ce9eeca6a266a432b961ad3f42da51afc32b487ae48fd5850ed9c513c0043559

    SHA512

    2233dfc4bc22fb75d96273f549911a748205d7d689f31a9280944c0828b4a8a2b146b5891c9432856100cc82219323a15701d41696b677ada42ea6d2b696961a