Analysis

  • max time kernel
    56s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 18:07

General

  • Target

    0a9b4442c7a9a1889949d063616358cd.exe

  • Size

    240KB

  • MD5

    0a9b4442c7a9a1889949d063616358cd

  • SHA1

    76e86ec2c1dd38b902c671a2a5b8c0cffe439699

  • SHA256

    12e79cf84a54180b053c263c7cb435a1a05367c2cb396fce076d873055bada81

  • SHA512

    616725a52189dbf63b96947abf20a192deb45d71d98e68607131d7c3ef37363fe610355fc7ef0f4f9b2ea9b7e92472d853007c12530d82f22117d7d2ef3978b3

  • SSDEEP

    3072:lkBGYT8j6VlpvBd90i/SmWKLi7CjFSivnfu3fbMdozt5cz+QL:lE0UGKGkFRKfeoztOX

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a9b4442c7a9a1889949d063616358cd.exe
    "C:\Users\Admin\AppData\Local\Temp\0a9b4442c7a9a1889949d063616358cd.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3484
    • C:\Users\Admin\ziaja.exe
      "C:\Users\Admin\ziaja.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3064

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\ziaja.exe

          Filesize

          232KB

          MD5

          3f988e7c94554dc448b60e22caa07eb3

          SHA1

          570809f9d6534b8590698dd7fcb79ffe1b442096

          SHA256

          38f069d85f611170af16b451d8ed0ada32cb1d726f1ed2524a6c0d1c57c8393d

          SHA512

          f1e41b8bec0d79e0eebda57cf782e114637148dff1ade5c648d126062b2bc660fee4ffbe33b389be72b775e00ef74dda97fbd09f959b3f79a3a7ea4d01c6a1e4

        • C:\Users\Admin\ziaja.exe

          Filesize

          134KB

          MD5

          5ed0ff392c0e2e978add0aead8461cdb

          SHA1

          68c5bb167480079148aad0d5956af34aca8fd00b

          SHA256

          fc7f0f2a0ee0eb66463d4831ff70b7d39e429084b299fe711f25e6cb698c5027

          SHA512

          282c00911d3c467406ef63d267acfc0e0f9312fd026c68bb7cde88d5e767d8985aed6767a43e790d15589b68564db0c5e1ccf28f63069475e1ea740dd2b5ffa1

        • C:\Users\Admin\ziaja.exe

          Filesize

          193KB

          MD5

          08fe5167dab9bc201105575c0a4fc3c0

          SHA1

          6ae4ab89553d2eab94a04b27728b888bbc90c6e9

          SHA256

          72422d255a82642916c5c667206b4769fbd2285ba41b0c4f6119931f017768e3

          SHA512

          3be0df79f66455504d598a7c3631559e7563b11b3b459be990e9c44c01c2e6c3d9a08b925a51c7ddef157454dd9d99346067f9c53f75a39b2e407077f16929bd