Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 10:43
Static task
static1
Behavioral task
behavioral1
Sample
9b778d8519139ce7f2d58bd6eb73ced4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9b778d8519139ce7f2d58bd6eb73ced4.exe
Resource
win10v2004-20231222-en
General
-
Target
9b778d8519139ce7f2d58bd6eb73ced4.exe
-
Size
292KB
-
MD5
9b778d8519139ce7f2d58bd6eb73ced4
-
SHA1
916d9b985dd2406d4a12cb41e95bfa8dd371d851
-
SHA256
d4c5edf8dddcc40aa71cc1a0cb6617c4cebc08efc07dfeee44abd910d59e9c33
-
SHA512
55694a8011d9c0c2c6edcf1a479a50a5e4eb3996055cc4b4a4992682bd2f145d4252d243f6837b942f581fb0c8bab9812027eb31631eafa4c66671f900b8e69d
-
SSDEEP
3072:Cn4Od4Y9diY/OBq7CFLuupaFBzxk7c7awSZohDnjV2S8NmMx3WarRDSJOtpTxzsd:CRiYILuupszxk7USZoDnp23xmg9HtEU
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 9b778d8519139ce7f2d58bd6eb73ced4.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zerez.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 9b778d8519139ce7f2d58bd6eb73ced4.exe -
Executes dropped EXE 1 IoCs
pid Process 1272 zerez.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /E" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /W" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /r" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /v" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /j" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /w" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /n" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /Q" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /V" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /x" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /L" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /p" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /b" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /Z" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /a" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /N" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /K" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /A" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /P" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /f" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /d" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /C" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /c" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /Y" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /S" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /G" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /M" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /D" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /s" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /q" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /J" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /R" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /U" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /u" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /F" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /i" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /o" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /k" 9b778d8519139ce7f2d58bd6eb73ced4.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /l" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /z" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /k" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /h" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /T" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /m" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /O" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /y" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /g" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /X" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /I" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /B" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /e" zerez.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\zerez = "C:\\Users\\Admin\\zerez.exe /t" zerez.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4076 9b778d8519139ce7f2d58bd6eb73ced4.exe 4076 9b778d8519139ce7f2d58bd6eb73ced4.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe 1272 zerez.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4076 9b778d8519139ce7f2d58bd6eb73ced4.exe 1272 zerez.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4076 wrote to memory of 1272 4076 9b778d8519139ce7f2d58bd6eb73ced4.exe 86 PID 4076 wrote to memory of 1272 4076 9b778d8519139ce7f2d58bd6eb73ced4.exe 86 PID 4076 wrote to memory of 1272 4076 9b778d8519139ce7f2d58bd6eb73ced4.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b778d8519139ce7f2d58bd6eb73ced4.exe"C:\Users\Admin\AppData\Local\Temp\9b778d8519139ce7f2d58bd6eb73ced4.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\zerez.exe"C:\Users\Admin\zerez.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
292KB
MD59c5c38ab8189616f7a798d39325234c0
SHA1d8602e930c1b6c8cbe62b28f124157633269fef0
SHA256d7c306d630701a91800aa451239da37a71fb229a6c85eff3b2fd40616b638ef3
SHA512e9d341b9b80c8902407c16c594718966db96ddc89211f43862f862441c4aff5d2e612b974b89fc0ce18f4a92d256e88d5faf97a9ca9773db6581196d63d2c7ab