Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/01/2024, 00:49

General

  • Target

    5bb1b51f497b8ab025bdb4d0305d177d.exe

  • Size

    156KB

  • MD5

    5bb1b51f497b8ab025bdb4d0305d177d

  • SHA1

    cbb6d975e6c5c2513e04eb3b249b24043a101927

  • SHA256

    c4b32f6fc9b8f78d79b00cd40efada235d08ff7077fb4a183c11772b5daf36b9

  • SHA512

    683a884ea95df5ad43a09cf786cfbe0c86e24843fb60a64370e329e1ca7325a6d7e4e31c6d6a2ef08c0ceb08572d284a2705f3c8f060e0fd82e0764e25504f33

  • SSDEEP

    3072:xANPhL3YsZtSxch3Z1C5GbWyleXkbxy6cg48Af4oQZiEh3:+PhcsZ5b1OGbU0NByhWL

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5bb1b51f497b8ab025bdb4d0305d177d.exe
    "C:\Users\Admin\AppData\Local\Temp\5bb1b51f497b8ab025bdb4d0305d177d.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4520
    • C:\Users\Admin\zoabai.exe
      "C:\Users\Admin\zoabai.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1620

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\zoabai.exe

          Filesize

          156KB

          MD5

          84fa4df0289600c10e786494935e6a65

          SHA1

          4a0725ece18e61b76ea7b1d8794c4eec612e6f84

          SHA256

          6ebbc692d2f0ecde8d3ef856f2ed26c19cdb20efe278c5c891f7dbc7ff321033

          SHA512

          7521f1c80bf8cfb90a3fd361c3b8b79547708069498154fa52320d93c8b12417b54aca31de8ab7ea2a95887725e3abcd414c5dbe57aae8e8b1c1260e1349ba79