Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15/01/2024, 00:49
Static task
static1
Behavioral task
behavioral1
Sample
5bb1b51f497b8ab025bdb4d0305d177d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5bb1b51f497b8ab025bdb4d0305d177d.exe
Resource
win10v2004-20231215-en
General
-
Target
5bb1b51f497b8ab025bdb4d0305d177d.exe
-
Size
156KB
-
MD5
5bb1b51f497b8ab025bdb4d0305d177d
-
SHA1
cbb6d975e6c5c2513e04eb3b249b24043a101927
-
SHA256
c4b32f6fc9b8f78d79b00cd40efada235d08ff7077fb4a183c11772b5daf36b9
-
SHA512
683a884ea95df5ad43a09cf786cfbe0c86e24843fb60a64370e329e1ca7325a6d7e4e31c6d6a2ef08c0ceb08572d284a2705f3c8f060e0fd82e0764e25504f33
-
SSDEEP
3072:xANPhL3YsZtSxch3Z1C5GbWyleXkbxy6cg48Af4oQZiEh3:+PhcsZ5b1OGbU0NByhWL
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 5bb1b51f497b8ab025bdb4d0305d177d.exe Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zoabai.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation 5bb1b51f497b8ab025bdb4d0305d177d.exe -
Executes dropped EXE 1 IoCs
pid Process 1620 zoabai.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /j" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /G" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /S" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /K" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /E" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /C" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /W" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /V" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /f" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /U" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /H" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /q" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /s" 5bb1b51f497b8ab025bdb4d0305d177d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /Z" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /e" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /J" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /v" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /w" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /i" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /a" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /F" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /u" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /m" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /d" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /z" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /O" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /L" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /T" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /Y" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /y" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /N" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /t" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /s" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /c" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /p" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /I" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /n" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /l" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /x" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /k" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /A" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /R" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /r" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /D" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /Q" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /X" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /g" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /M" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /o" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /b" zoabai.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zoabai = "C:\\Users\\Admin\\zoabai.exe /P" zoabai.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4520 5bb1b51f497b8ab025bdb4d0305d177d.exe 4520 5bb1b51f497b8ab025bdb4d0305d177d.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe 1620 zoabai.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4520 5bb1b51f497b8ab025bdb4d0305d177d.exe 1620 zoabai.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4520 wrote to memory of 1620 4520 5bb1b51f497b8ab025bdb4d0305d177d.exe 90 PID 4520 wrote to memory of 1620 4520 5bb1b51f497b8ab025bdb4d0305d177d.exe 90 PID 4520 wrote to memory of 1620 4520 5bb1b51f497b8ab025bdb4d0305d177d.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bb1b51f497b8ab025bdb4d0305d177d.exe"C:\Users\Admin\AppData\Local\Temp\5bb1b51f497b8ab025bdb4d0305d177d.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\zoabai.exe"C:\Users\Admin\zoabai.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD584fa4df0289600c10e786494935e6a65
SHA14a0725ece18e61b76ea7b1d8794c4eec612e6f84
SHA2566ebbc692d2f0ecde8d3ef856f2ed26c19cdb20efe278c5c891f7dbc7ff321033
SHA5127521f1c80bf8cfb90a3fd361c3b8b79547708069498154fa52320d93c8b12417b54aca31de8ab7ea2a95887725e3abcd414c5dbe57aae8e8b1c1260e1349ba79