Analysis
-
max time kernel
113s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 08:09
Behavioral task
behavioral1
Sample
0x00080000000233f3-125.exe
Resource
win10v2004-20240426-en
windows10-2004-x64
2 signatures
1800 seconds
Behavioral task
behavioral2
Sample
zeogen.pyc
Resource
win10v2004-20240426-en
windows10-2004-x64
6 signatures
1800 seconds
General
-
Target
zeogen.pyc
-
Size
9KB
-
MD5
a3f5a9be5ff5b726b5ed338a36fa754b
-
SHA1
35e1a0f0838e2db24cb9ef4cb78cab9243b00b11
-
SHA256
e87646cac23981b376c6dfed83e51c54a1368b7bbdb70f927b9c513aec51e5e9
-
SHA512
5f24d2c6743b8d4418258b35fc5787da5213444c91a4b8b899ac52f05c3dacd5994fcc1887c5445ac32a605bbde29b44e649c44b75c49948f88158647000da32
-
SSDEEP
192:DpBMAlg11C/AVUerkIaMpevGhH6f8Fx4xkImnfOeWXiZ/QO:DwAlg11C/AWerkIa6GGhHA8FxUnmnlyE
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3096 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5092 OpenWith.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 5092 OpenWith.exe 5092 OpenWith.exe 5092 OpenWith.exe 5092 OpenWith.exe 5092 OpenWith.exe 5092 OpenWith.exe 5092 OpenWith.exe 5092 OpenWith.exe 5092 OpenWith.exe 5092 OpenWith.exe 5092 OpenWith.exe 5092 OpenWith.exe 5092 OpenWith.exe 5092 OpenWith.exe 5092 OpenWith.exe 5092 OpenWith.exe 5092 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5092 wrote to memory of 3096 5092 OpenWith.exe 103 PID 5092 wrote to memory of 3096 5092 OpenWith.exe 103
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\zeogen.pyc1⤵
- Modifies registry class
PID:2856
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\zeogen.pyc2⤵
- Opens file in notepad (likely ransom note)
PID:3096
-