Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/02/2024, 10:43

General

  • Target

    9b778d8519139ce7f2d58bd6eb73ced4.exe

  • Size

    292KB

  • MD5

    9b778d8519139ce7f2d58bd6eb73ced4

  • SHA1

    916d9b985dd2406d4a12cb41e95bfa8dd371d851

  • SHA256

    d4c5edf8dddcc40aa71cc1a0cb6617c4cebc08efc07dfeee44abd910d59e9c33

  • SHA512

    55694a8011d9c0c2c6edcf1a479a50a5e4eb3996055cc4b4a4992682bd2f145d4252d243f6837b942f581fb0c8bab9812027eb31631eafa4c66671f900b8e69d

  • SSDEEP

    3072:Cn4Od4Y9diY/OBq7CFLuupaFBzxk7c7awSZohDnjV2S8NmMx3WarRDSJOtpTxzsd:CRiYILuupszxk7USZoDnp23xmg9HtEU

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b778d8519139ce7f2d58bd6eb73ced4.exe
    "C:\Users\Admin\AppData\Local\Temp\9b778d8519139ce7f2d58bd6eb73ced4.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4076
    • C:\Users\Admin\zerez.exe
      "C:\Users\Admin\zerez.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1272

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\zerez.exe

          Filesize

          292KB

          MD5

          9c5c38ab8189616f7a798d39325234c0

          SHA1

          d8602e930c1b6c8cbe62b28f124157633269fef0

          SHA256

          d7c306d630701a91800aa451239da37a71fb229a6c85eff3b2fd40616b638ef3

          SHA512

          e9d341b9b80c8902407c16c594718966db96ddc89211f43862f862441c4aff5d2e612b974b89fc0ce18f4a92d256e88d5faf97a9ca9773db6581196d63d2c7ab