Analysis
-
max time kernel
162s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 17:15
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
General
-
Target
tmp.exe
-
Size
605KB
-
MD5
fae868e1e5cfc5b1ad62e21c2201893b
-
SHA1
6469b546f298cdd2265902acfc1e57ac14177915
-
SHA256
e88f33997f0017e4263bf7b7eff4bc6c15d8d9aa3357e9dd75af0ca80f945050
-
SHA512
659b92bca49e8cfcef29aa6451748ceaa69165e01df8f96781d479dc9a96611718b0fc6839b1d03f794be8ccc579ebb82de52294d522a9f93a46a2f22e43a12c
-
SSDEEP
12288:/YhX7MMHiMZ/D2cSLEGZuuXxHooRwfWz+ji/pD:/YhX7vCyD2f/yX+KjcpD
Malware Config
Extracted
formbook
poub
WY0eksfISzRg4O6c+opnGL6gaw==
moRjn9ExtYi8UmUo+Tya
2vME+GedoxzFnuLXesUoVj4=
EvW4JWJ1NQ8nN3tA3SM=
2mK9efMZMgN1VOs=
8d0jua5b0J6AQEW7
/2cyThOd37DSTYMASDye4Q0t/Vs=
ral+tbIh2KKAQEW7
YLY9jsPtYB/FRmMo+Tya
R1WcElWAMtFxFrVqtZT2ZpIS9xRZNho=
KFXGg/T1pCC9GjrxUPTcjw==
8mMlK5nDwjjPFTP5jMtAtQ0t/Vs=
c7am8nhhlCo=
UW91trZj6dENxuRdpxOvW1Cf
sjOMUcvq6lYJCZEfV4euFzY=
62nBgPjdmWQkmWElww==
64E8JqA1aruSUvw=
NqI1reXpcR+REye0
8+y1oOsbjgSyEhjXUPTcjw==
Rx9by8gNBwN1VOs=
Muif0yE4CQN1VOs=
VEt6//SsIukFo46EOTs=
Z8su52MYL67C
usDwuHRs8/KlWg==
idmltXXu7XAgHLE/UPTcjw==
QPrxO2shWNiGexGboHDSRqBQ1TBd
hq9rqBND8/KlWg==
QS9iHFx08/KlWg==
v1soVFoThEdt/B/dK0v4+6Wb
7rqJytN13KKAQEW7
OWbeN2SDJwonsI6EOTs=
aqQrrKZDm16GMlAtvxavW1Cf
imnEZWIEbC4M8Q+i
Bry3oQg5+6ZaUNxzwg==
B3vYmyxPQS5XYvmCsqQXX8X948Zf
KbGBmwwCyKTKsUcRUNN6CD61aw==
2WpDae4P+W4cdqc8kPBcjqg0wS1X
MvkZLPRY25jI
Alr0VZGxYxG3dR/zSNjBhQ==
ZJkdjczlrF+8l0Os
dcmMkFm+QhFD4OM=
fMdUrd4J1n4mmWElww==
Gat+k1fHg11vTQ==
sn+7Q4uxaAu9FyGv7k24F1DWaBEvmRI=
CjvGRTnXOhtN6QSNxhmvW1Cf
CpHvP2VSxaKAQEW7
qQWkEUJYFKhPttOZ4MarX8KKLl+/Jg==
GNVP4yIy8/KlWg==
pqfVAERhYxN7YPM=
9nS5b/AGCpZNAfZj1A==
a3GcpSND8/KlWg==
fin6NmQXayreIOrzPyw=
EjdROfeTsDPVH+rzPyw=
DO4xD8nURBwM8Q+i
+p/LQHFh0KOAQEW7
iNos10QpwjvjvFrXJYtYFiuHdA==
SX//aFP4Yi5T6NbcKQr07J6e
2NKh0dNr52sTdH4OSNjBhQ==
ZMSJmgsxFrlp5fnecrgeVYcP4xRZNho=
oXmlavAJ+3IbFbl3Gm4H+iKG
ijjWRYCaXiTcigreSNjBhQ==
ZqpH49I4XPu1k+rzPyw=
ZZUh+4FrrBbKukgJWoeuFzY=
lLnTxHn7rq/W9G8rzjsgCnyBYw==
drzjup.space
Signatures
-
Xloader payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3016-144-0x0000000000400000-0x000000000042C000-memory.dmp xloader behavioral2/memory/3016-149-0x0000000000400000-0x000000000042C000-memory.dmp xloader behavioral2/memory/4356-155-0x0000000000E50000-0x0000000000E7C000-memory.dmp xloader behavioral2/memory/4356-157-0x0000000000E50000-0x0000000000E7C000-memory.dmp xloader -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
zkozagrkac.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation zkozagrkac.exe -
Executes dropped EXE 2 IoCs
Processes:
zkozagrkac.exezkozagrkac.exepid process 1272 zkozagrkac.exe 3016 zkozagrkac.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
zkozagrkac.exezkozagrkac.exesystray.exedescription pid process target process PID 1272 set thread context of 3016 1272 zkozagrkac.exe zkozagrkac.exe PID 3016 set thread context of 748 3016 zkozagrkac.exe Explorer.EXE PID 4356 set thread context of 748 4356 systray.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 62 IoCs
Processes:
zkozagrkac.exesystray.exepid process 3016 zkozagrkac.exe 3016 zkozagrkac.exe 3016 zkozagrkac.exe 3016 zkozagrkac.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe 4356 systray.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 748 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
zkozagrkac.exezkozagrkac.exesystray.exepid process 1272 zkozagrkac.exe 3016 zkozagrkac.exe 3016 zkozagrkac.exe 3016 zkozagrkac.exe 4356 systray.exe 4356 systray.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
zkozagrkac.exesystray.exedescription pid process Token: SeDebugPrivilege 3016 zkozagrkac.exe Token: SeDebugPrivilege 4356 systray.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
zkozagrkac.exepid process 1272 zkozagrkac.exe 1272 zkozagrkac.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
zkozagrkac.exepid process 1272 zkozagrkac.exe 1272 zkozagrkac.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
tmp.exezkozagrkac.exeExplorer.EXEsystray.exedescription pid process target process PID 1772 wrote to memory of 1272 1772 tmp.exe zkozagrkac.exe PID 1772 wrote to memory of 1272 1772 tmp.exe zkozagrkac.exe PID 1772 wrote to memory of 1272 1772 tmp.exe zkozagrkac.exe PID 1272 wrote to memory of 3016 1272 zkozagrkac.exe zkozagrkac.exe PID 1272 wrote to memory of 3016 1272 zkozagrkac.exe zkozagrkac.exe PID 1272 wrote to memory of 3016 1272 zkozagrkac.exe zkozagrkac.exe PID 1272 wrote to memory of 3016 1272 zkozagrkac.exe zkozagrkac.exe PID 748 wrote to memory of 4356 748 Explorer.EXE systray.exe PID 748 wrote to memory of 4356 748 Explorer.EXE systray.exe PID 748 wrote to memory of 4356 748 Explorer.EXE systray.exe PID 4356 wrote to memory of 1572 4356 systray.exe cmd.exe PID 4356 wrote to memory of 1572 4356 systray.exe cmd.exe PID 4356 wrote to memory of 1572 4356 systray.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\zkozagrkac.exe"C:\Users\Admin\AppData\Local\Temp\zkozagrkac.exe" "C:\Users\Admin\AppData\Local\Temp\iotriknymm.au3"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\zkozagrkac.exe"C:\Users\Admin\AppData\Local\Temp\zkozagrkac.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\zkozagrkac.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\iotriknymm.au3Filesize
3KB
MD51adf412812f453fbff138af1ef1d14c6
SHA1e6c95ede41fa9e226874be6093ed654d5fb7272d
SHA2567bd7b67c3c47ee35aea15072f9a7caa8d3d866275f08b84bb3732a2bc53b36da
SHA512b16216bbe7e3d7e426055115dc9cf06d7a5b409c1594b3bf2c97644bc0f440b3a79f691690129634263d4ec4f565ae895dfb8126cc41c5040ef5e4f402a6b1e1
-
C:\Users\Admin\AppData\Local\Temp\yiuxi.tFilesize
50KB
MD5eef5710a3ffe25919588c0344e4a24a7
SHA19e97eb93b36cb1cee4bcb71d17d035aada86812d
SHA256cdcc51db7f0a4c644fcf97ec9c42bee82d1a6b617cf64ac12b55e559bff29f2e
SHA512604c328432a030beb2d91023206c546577d8c243e77f0c747cd04808375417f84b13aeb254eae0bda1394207ca1291aa2313936d45abe660e8546942b30cbfaf
-
C:\Users\Admin\AppData\Local\Temp\ysoxzjueeaw.qgvFilesize
196KB
MD54128c01597bb4f7bab1536acd9dab137
SHA1e15d675cfd5caf081dd8cf18af516c8d4844e116
SHA25684bc6477375743180c6b50e1550ee4747e817b66a498e0e47483802146d3e961
SHA51272774b4dfa6f3eb7098d6eba99e91f21f8578d14e77f01daf0fe515b46b893c4bdfc5aded380dcc1491d83ed2a66d9315ec67dd44277ce0e80ff11057e5fb6e9
-
C:\Users\Admin\AppData\Local\Temp\zkozagrkac.exeFilesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\zkozagrkac.exeFilesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\zkozagrkac.exeFilesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
memory/748-163-0x0000000003280000-0x000000000335D000-memory.dmpFilesize
884KB
-
memory/748-161-0x0000000003280000-0x000000000335D000-memory.dmpFilesize
884KB
-
memory/748-160-0x0000000003280000-0x000000000335D000-memory.dmpFilesize
884KB
-
memory/748-151-0x0000000008F20000-0x00000000090CC000-memory.dmpFilesize
1.7MB
-
memory/1272-143-0x0000000000F50000-0x0000000000F52000-memory.dmpFilesize
8KB
-
memory/3016-144-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/3016-149-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/3016-150-0x0000000000F40000-0x0000000000F51000-memory.dmpFilesize
68KB
-
memory/3016-148-0x00000000013B0000-0x00000000016FA000-memory.dmpFilesize
3.3MB
-
memory/4356-152-0x0000000000EB0000-0x0000000000EB6000-memory.dmpFilesize
24KB
-
memory/4356-153-0x0000000000EB0000-0x0000000000EB6000-memory.dmpFilesize
24KB
-
memory/4356-155-0x0000000000E50000-0x0000000000E7C000-memory.dmpFilesize
176KB
-
memory/4356-156-0x0000000002DC0000-0x000000000310A000-memory.dmpFilesize
3.3MB
-
memory/4356-157-0x0000000000E50000-0x0000000000E7C000-memory.dmpFilesize
176KB
-
memory/4356-159-0x0000000002C30000-0x0000000002CC0000-memory.dmpFilesize
576KB