Analysis
-
max time kernel
151s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 18:15
Static task
static1
Behavioral task
behavioral1
Sample
aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe
Resource
win10v2004-20221111-en
General
-
Target
aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe
-
Size
156KB
-
MD5
83dff9135ef3c793b2f6c170b2c46937
-
SHA1
d34c5efc61547948c7caa8a05fb422d1d56bb041
-
SHA256
aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02
-
SHA512
f0b188742cd28610943daba6a4ab54e9a01dbf5a68824e61711bfdce9f73feb5e2aece252f16eb945dff2e05a202d44398427d6bcc3e7cd05eaab540e74a29c1
-
SSDEEP
3072:mnoxLFxOpMS7yJuu4TrVlpT3rZy93E3ipMdIyH+Y8DuA2IXTg4oQZiEn6:JxNfJuu4l3rZy93UipMd9+Y8DuYAWw
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" skzov.exe -
Executes dropped EXE 1 IoCs
pid Process 1652 skzov.exe -
Loads dropped DLL 2 IoCs
pid Process 2036 aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe 2036 aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /g" skzov.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /V" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /v" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /a" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /c" aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /d" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /Y" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /W" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /M" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /t" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /B" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /P" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /k" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /h" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /i" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /s" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /O" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /H" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /G" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /T" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /f" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /L" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /z" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /K" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /R" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /u" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /p" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /Q" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /E" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /C" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /U" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /X" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /o" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /b" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /r" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /A" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /e" skzov.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /S" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /J" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /n" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /Z" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /y" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /I" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /D" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /x" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /l" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /j" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /N" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /c" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /F" skzov.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\skzov = "C:\\Users\\Admin\\skzov.exe /m" skzov.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2036 aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe 1652 skzov.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2036 aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe 1652 skzov.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1652 2036 aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe 27 PID 2036 wrote to memory of 1652 2036 aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe 27 PID 2036 wrote to memory of 1652 2036 aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe 27 PID 2036 wrote to memory of 1652 2036 aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe"C:\Users\Admin\AppData\Local\Temp\aa91ec1cb736e13344f97751c4566d3d17b8c449e5877f51bf07a0ab92daca02.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\skzov.exe"C:\Users\Admin\skzov.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1652
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD5470cc6ed283e4b216bf9b3ca94711e40
SHA1bd808f9297b78bfe9af8ffc8c9d8edc0f1f9b81e
SHA25678a63a930e2f21a050ac0c427d3f15e3bd17bc96400c5dc16bb9318baaf2d496
SHA512848331bac0e00f863566e7a4943cf68e4c060627ddd282e89a08bc44e3647887a29477a2af9093b09d022c1cc13d84ef24a7404e6db7ee347ed1375b632dca20
-
Filesize
156KB
MD5470cc6ed283e4b216bf9b3ca94711e40
SHA1bd808f9297b78bfe9af8ffc8c9d8edc0f1f9b81e
SHA25678a63a930e2f21a050ac0c427d3f15e3bd17bc96400c5dc16bb9318baaf2d496
SHA512848331bac0e00f863566e7a4943cf68e4c060627ddd282e89a08bc44e3647887a29477a2af9093b09d022c1cc13d84ef24a7404e6db7ee347ed1375b632dca20
-
Filesize
156KB
MD5470cc6ed283e4b216bf9b3ca94711e40
SHA1bd808f9297b78bfe9af8ffc8c9d8edc0f1f9b81e
SHA25678a63a930e2f21a050ac0c427d3f15e3bd17bc96400c5dc16bb9318baaf2d496
SHA512848331bac0e00f863566e7a4943cf68e4c060627ddd282e89a08bc44e3647887a29477a2af9093b09d022c1cc13d84ef24a7404e6db7ee347ed1375b632dca20
-
Filesize
156KB
MD5470cc6ed283e4b216bf9b3ca94711e40
SHA1bd808f9297b78bfe9af8ffc8c9d8edc0f1f9b81e
SHA25678a63a930e2f21a050ac0c427d3f15e3bd17bc96400c5dc16bb9318baaf2d496
SHA512848331bac0e00f863566e7a4943cf68e4c060627ddd282e89a08bc44e3647887a29477a2af9093b09d022c1cc13d84ef24a7404e6db7ee347ed1375b632dca20