Analysis

  • max time kernel
    230s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    14/05/2020, 06:31

General

  • Target

    zeranine.exe

  • Size

    49KB

  • MD5

    d28ebd73070fa0186dfc2ca7d8cb318e

  • SHA1

    7475d4abdb7e7572ae0e963d0b2b4052068f918e

  • SHA256

    8eee962604f560e0a00cd592dbe6bc3cf2aae138439b5bdb132d92ee32830bfe

  • SHA512

    c4bc498d5eb5e667cd9cf01294900653ead7acc8c7f70304ab5ec08a9e396c3afcc2a06408c662c29eae789fdbf95d42f7a95635ebdc12c80ec1485df4187144

Score
10/10

Malware Config

Signatures

  • Zeronine Ransomware

    Encrypts files with .zeronine extension and displays popup with ransom instructions in Turkish and English.

  • Modifies registry class 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\zeranine.exe
    "C:\Users\Admin\AppData\Local\Temp\zeranine.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1440

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1440-2-0x0000000008600000-0x0000000008601000-memory.dmp

    Filesize

    4KB

  • memory/1440-4-0x0000000008600000-0x0000000008601000-memory.dmp

    Filesize

    4KB

  • memory/1440-7-0x0000000008600000-0x0000000008601000-memory.dmp

    Filesize

    4KB

  • memory/1440-9-0x0000000008600000-0x0000000008601000-memory.dmp

    Filesize

    4KB