Analysis

  • max time kernel
    153s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 17:59

General

  • Target

    2023-08-26_51e3c1e8f1e4bb84098cc6f86092aa51_zeppelin_JC.exe

  • Size

    211KB

  • MD5

    51e3c1e8f1e4bb84098cc6f86092aa51

  • SHA1

    d0dd5aa280c4db736aa1130d54cb8e8bd4830ccb

  • SHA256

    d7cece314f0c504bdb7f097718c4d66e4e5132016c83d9fbffb82528f440b13c

  • SHA512

    f6f274b7bfb91050f98a5190aac5790dc3d8d46b147f4200a993015442234c630a425b9800e2758aab4de5d554cf793d1ee529de3cafbf052fa29a05efe73080

  • SSDEEP

    6144:yia1gMHOPDWIhID8X/4DQFu/U3buRKlemZ9DnGAetTsB+7o+:yIMH06cID84DQFu/U3buRKlemZ9DnGAI

Malware Config

Extracted

Path

C:\Program Files\Java\jdk1.7.0_80\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT

Family

buran

Ransom Note
!!! ALL YOUR FILES ARE ENCRYPTED !!! All your files, documents, photos, databases and other important files are encrypted. You are not able to decrypt it by yourself! The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. To be sure we have the decryptor and it works you can send an email: [email protected] and decrypt one file for free. But this file should be of not valuable! Do you really want to restore your files? Write to email: [email protected] Reserved email: [email protected] Your personal ID: 1C4-0A6-B75 Attention! * Do not rename encrypted files. * Do not try to decrypt your data using third party software, it may cause permanent data loss. * Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

Signatures

  • Buran

    Ransomware-as-a-service based on the VegaLocker family first identified in 2019.

  • Detects Zeppelin payload 21 IoCs
  • Zeppelin Ransomware

    Ransomware-as-a-service (RaaS) written in Delphi and first seen in 2019.

  • Renames multiple (2933) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2023-08-26_51e3c1e8f1e4bb84098cc6f86092aa51_zeppelin_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\2023-08-26_51e3c1e8f1e4bb84098cc6f86092aa51_zeppelin_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe" -start
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Suspicious use of WriteProcessMemory
      PID:2148
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe" -agent 1
        3⤵
        • Executes dropped EXE
        PID:2524
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe" -agent 0
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        PID:2716
    • C:\Windows\SysWOW64\notepad.exe
      notepad.exe
      2⤵
      • Deletes itself
      PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\Vdk10.lng

    Filesize

    23KB

    MD5

    2eb83401839e231252f29cc91a462f36

    SHA1

    b37fbb90c1cfdfa6d47099347ed49dba4fb291a4

    SHA256

    6092958378377d54041ad823e4bf12ecbc6e413c6223d72f115ebfa3f0b47a6a

    SHA512

    94047f7c47ab1ffaca98318ef48bd2491cda4fb7946dfae0d950c6b576fb0216307e6cc945d8c1450dde7e8d3a45ab523c2466b8b75681403eb7be34f19a2ae5

  • C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_GB_EURO.txt

    Filesize

    29KB

    MD5

    755b54ebc51cfe4c39f6f75b0c0ec735

    SHA1

    83b5aadab021c199a9592917c6aa60a18d592690

    SHA256

    87e3925f1f60ba19150ec034748d0fce540f6a762a665dd964ea4013f133aded

    SHA512

    550ce34280fd1034e9e1cac1fdf1df3117c3fd2c44afd352e4184b40a0a75b0b17d2e4a55026fdf3be63b84b4961272ebfc07896f8f9ae8537bcde5fc4d5e352

  • C:\Program Files\Java\jdk1.7.0_80\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT

    Filesize

    943B

    MD5

    12c8ec7f840778f5818d7171fb566b0f

    SHA1

    24a6a8a18cf59d6c4f47167f94fe4ae021402f53

    SHA256

    b6cf49ce5ed0ef88acdc6d366d884ec464e8fde9a87de28c8fab960e207cf00d

    SHA512

    ed1ebefcf928aee8b6e02f581b62416d1f2b243264a0b16df00cdfe83dfa20e0a66d13e2b18776dc5618f73dcf952091f2a77a5d38e0f33b72fff117f2e91595

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\license.html

    Filesize

    7KB

    MD5

    b503d4244b5f9f3a77b361d2b9f8994a

    SHA1

    15fe3c7e3b14d9073e30c0f616751b3c4df4399e

    SHA256

    8d5c887daa70fbfd2f5ada6727292e4ce54f2ca4cefa1c9e872abe80ef3287ad

    SHA512

    d7c7fbb09c3c9addd563ba76db3adedfc2b30952e658220b1659d99a0a1e1d4d190ca957695f0045ee09693fb858d221f2f305d6e9f6949e71ef4e02b9584d50

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\license.html

    Filesize

    10KB

    MD5

    65785e26f773d431f2db144b1c2deedb

    SHA1

    d5706428aa1ce2bcb7e1384945ffc900f01a52e0

    SHA256

    776db8ecfd653df16e1299628dec7d14ababb91535cf2d07c159dadfe3975dd6

    SHA512

    293d3116bf59ec1bfec464f359147269782019c09e1df09f93dac2aaad6917700c9e928631760616556c94de32e005f632be2346dfc970d71d06f44793462a8a

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\ECLIPSE_.RSA

    Filesize

    9KB

    MD5

    e61e9d594779a1f4b265128fc764a9d0

    SHA1

    88b6d93531e771089786892671fa3d20c02fda9d

    SHA256

    7f4c4931e92cd98fbcb12a28d96f11b19e72afd11a1c3caa37ba679a44c8ec0a

    SHA512

    bb2cee69296df33360f7587a4440b23b2089b99df921b6057acde13dc9139a3980d3d85eda93834cac313e34697ec2d26f15a93310a75a0c8a4cfdcaf0873684

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\license.html

    Filesize

    10KB

    MD5

    5691a016f57b158dbebc7a713396f219

    SHA1

    ac7ddeed1cfe59f323a54db491b22e792df6403c

    SHA256

    23217e29af9e0e49c0db082bdec5ab2905d628fbf60fcd54844e77bc3ca8f450

    SHA512

    7f5721db2b295b2f004aa9d2b58da58988bd93399bbc2259f2bc689a41cd8048e912204451119c76316a282646b8e4fd1bced0fad8ac84ce6618ee6a28cd04db

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\epl-v10.html

    Filesize

    13KB

    MD5

    a7f7ec2032ba47d385d6f512ff7e1b8b

    SHA1

    d641ac3507375469f928fc8fdc941f0f4435e8d1

    SHA256

    2f2605828d4cab17430a0e7b85699f666b3c7a9154225200d341a0d21e941128

    SHA512

    bfd427831b6e82cb11957eae9e420a2945af3b827a526410395aeafcd14e2ca202c081e34fba6837dfaa62a30bab127ffa1b6e7c4aa69ee9745531eeef9f585f

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\license.html

    Filesize

    10KB

    MD5

    3db9032d39c181f98c78f83adf544199

    SHA1

    a2dea29510fd8bed2ae5838c5f9ae0740f187936

    SHA256

    e4111e111e430137997bc9bb88b5de0141d48ef7fb07635a5320d584bda29528

    SHA512

    ca0a8bd2f491e227b38c8f3a1e3dddb44ad146ff7fa67e49f22443770a200a14f341351a1742956780b7398c0f495d321bf3d278ac973d64943c3070fb19b78f

  • C:\Program Files\VideoLAN\VLC\locale\es\LC_MESSAGES\vlc.mo

    Filesize

    604KB

    MD5

    dc0b08d873ead2db1ec95c43716d17f4

    SHA1

    8839f270b787302e83a85b18a59c1dfc8ad94953

    SHA256

    08cf5d1684cb9b3cc83efb3a02a5dc986933833a459d459475e8b1f4f63dad67

    SHA512

    855a93d410275b4586aecae9ea4b27bcd7bd989eb7db4f29fd4a80029ccbb6f6aef5f95a153faa215b392f6d4d506324f0d1f6f2a5a25685a0a5793a68555d3e

  • C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\vlc.mo

    Filesize

    606KB

    MD5

    c49da7935595a665304806a462dd5b89

    SHA1

    07a036aaf07a89f4a79b181c9a14ac12fe7401e6

    SHA256

    ae61aab85f587eeda9e26a21bc6ed3270876a62060b4f3de80874e080e966ae8

    SHA512

    34c7308810b9666e12b330ad0a537dd647154fc4a2138e209adf771621b8dc9cef2c79610016a6a23e81b7de106b8b20b2b8a30c29c5c5b246a4ddf0bbcaa320

  • C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\vlc.mo

    Filesize

    785KB

    MD5

    c4c2b7e3cd1b852417ba0693a1847803

    SHA1

    f40d88c819b0d80461319a8baec1e87fa44dc76f

    SHA256

    56ed2fdc62d76d207f0bcf5959a984e44cf00b8f0c57e9ce9a1d6391edf422fb

    SHA512

    ed863df552a91d1cb402511dd966ec4b1b57efe49f9f3427239fd8a6d09bf51fa24031f38131b9ec6f0ead98c3aa565fe70b4d8ec87a787047e67ab39fd1b7b6

  • C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\vlc.mo

    Filesize

    587KB

    MD5

    596cc03751627bf52343a931c0a8c0ba

    SHA1

    f2489b8403df86c874341f59ef8da4bdbd0d81e9

    SHA256

    944be7f58011c1d857ff2448aa8e5b2c6c7a9d832a3ba0dafa698b21dc89db92

    SHA512

    61e2ef6ec0399fce0e0dc896ed5d3914ad6d1825f8701ed70c73f61e0ba650a499bbe0e2a28ac0647d64ff9ab0abba0dda96ce8ca4f6f95f90d097ae28e70e9d

  • C:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\vlc.mo

    Filesize

    621KB

    MD5

    07e47198b3397f6c8aab20a9479f3e9f

    SHA1

    aef05cdf1ba4be61eee010a38cf6744578789a96

    SHA256

    7793e8ed44ef0b9cfdfee947c62a2cdfcd181ced7cb6568a2e6c3c3f1e4d43f8

    SHA512

    cff0f6962250ac2ba7895bc1d8e765aad880f67d4f35c6493f525065d365aad9864c0b322cbeb2a0f68721e479506d6d3f08d71f5dc2b76f43b94f5b4fc9d5dd

  • C:\Program Files\VideoLAN\VLC\locale\uk\LC_MESSAGES\vlc.mo

    Filesize

    771KB

    MD5

    046c627f375d48aaaef6ccd3aa4525aa

    SHA1

    13eb2875bfc011eb6e0586c36db8b220d18768e9

    SHA256

    ece063776a638c086bf8e9a286e58062eb4b1fa94c1423638f30e5fa98f74883

    SHA512

    8714bedd444fef744c7b72edf4341d81ce244f5805d6a85ce26e8f5573896e1abac8a8b545a85f59a8919b4982ed2b1d02dbc34e39b859e6a439c2ec562960df

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe

    Filesize

    211KB

    MD5

    51e3c1e8f1e4bb84098cc6f86092aa51

    SHA1

    d0dd5aa280c4db736aa1130d54cb8e8bd4830ccb

    SHA256

    d7cece314f0c504bdb7f097718c4d66e4e5132016c83d9fbffb82528f440b13c

    SHA512

    f6f274b7bfb91050f98a5190aac5790dc3d8d46b147f4200a993015442234c630a425b9800e2758aab4de5d554cf793d1ee529de3cafbf052fa29a05efe73080

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe

    Filesize

    211KB

    MD5

    51e3c1e8f1e4bb84098cc6f86092aa51

    SHA1

    d0dd5aa280c4db736aa1130d54cb8e8bd4830ccb

    SHA256

    d7cece314f0c504bdb7f097718c4d66e4e5132016c83d9fbffb82528f440b13c

    SHA512

    f6f274b7bfb91050f98a5190aac5790dc3d8d46b147f4200a993015442234c630a425b9800e2758aab4de5d554cf793d1ee529de3cafbf052fa29a05efe73080

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe

    Filesize

    211KB

    MD5

    51e3c1e8f1e4bb84098cc6f86092aa51

    SHA1

    d0dd5aa280c4db736aa1130d54cb8e8bd4830ccb

    SHA256

    d7cece314f0c504bdb7f097718c4d66e4e5132016c83d9fbffb82528f440b13c

    SHA512

    f6f274b7bfb91050f98a5190aac5790dc3d8d46b147f4200a993015442234c630a425b9800e2758aab4de5d554cf793d1ee529de3cafbf052fa29a05efe73080

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe

    Filesize

    211KB

    MD5

    51e3c1e8f1e4bb84098cc6f86092aa51

    SHA1

    d0dd5aa280c4db736aa1130d54cb8e8bd4830ccb

    SHA256

    d7cece314f0c504bdb7f097718c4d66e4e5132016c83d9fbffb82528f440b13c

    SHA512

    f6f274b7bfb91050f98a5190aac5790dc3d8d46b147f4200a993015442234c630a425b9800e2758aab4de5d554cf793d1ee529de3cafbf052fa29a05efe73080

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe

    Filesize

    211KB

    MD5

    51e3c1e8f1e4bb84098cc6f86092aa51

    SHA1

    d0dd5aa280c4db736aa1130d54cb8e8bd4830ccb

    SHA256

    d7cece314f0c504bdb7f097718c4d66e4e5132016c83d9fbffb82528f440b13c

    SHA512

    f6f274b7bfb91050f98a5190aac5790dc3d8d46b147f4200a993015442234c630a425b9800e2758aab4de5d554cf793d1ee529de3cafbf052fa29a05efe73080

  • C:\vcredist2010_x86.log.html

    Filesize

    83KB

    MD5

    97bec1096f7414e59f00560478447a13

    SHA1

    be4b889047088ec6bca6926cb67e7d9539c8577e

    SHA256

    a7ce0118cd4f7ebe905c1f10f477b7e3788fb6c75dfeb8a0d22545874f108fc9

    SHA512

    2a824be86e7a273fa7875ceaac3732d2b26e5cb37681796bd1a97779bc4257efbaf5746c5682cab89eddc0100abf8d5658861392188ef680ef041a876309b23e

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe

    Filesize

    211KB

    MD5

    51e3c1e8f1e4bb84098cc6f86092aa51

    SHA1

    d0dd5aa280c4db736aa1130d54cb8e8bd4830ccb

    SHA256

    d7cece314f0c504bdb7f097718c4d66e4e5132016c83d9fbffb82528f440b13c

    SHA512

    f6f274b7bfb91050f98a5190aac5790dc3d8d46b147f4200a993015442234c630a425b9800e2758aab4de5d554cf793d1ee529de3cafbf052fa29a05efe73080

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\services.exe

    Filesize

    211KB

    MD5

    51e3c1e8f1e4bb84098cc6f86092aa51

    SHA1

    d0dd5aa280c4db736aa1130d54cb8e8bd4830ccb

    SHA256

    d7cece314f0c504bdb7f097718c4d66e4e5132016c83d9fbffb82528f440b13c

    SHA512

    f6f274b7bfb91050f98a5190aac5790dc3d8d46b147f4200a993015442234c630a425b9800e2758aab4de5d554cf793d1ee529de3cafbf052fa29a05efe73080

  • memory/2148-860-0x0000000000B20000-0x0000000000C60000-memory.dmp

    Filesize

    1.2MB

  • memory/2524-25-0x0000000000B20000-0x0000000000C60000-memory.dmp

    Filesize

    1.2MB

  • memory/2716-8245-0x0000000000B20000-0x0000000000C60000-memory.dmp

    Filesize

    1.2MB

  • memory/2716-10643-0x0000000000B20000-0x0000000000C60000-memory.dmp

    Filesize

    1.2MB

  • memory/2716-2343-0x0000000000B20000-0x0000000000C60000-memory.dmp

    Filesize

    1.2MB

  • memory/2716-8289-0x0000000000B20000-0x0000000000C60000-memory.dmp

    Filesize

    1.2MB

  • memory/2716-5939-0x0000000000B20000-0x0000000000C60000-memory.dmp

    Filesize

    1.2MB

  • memory/2716-5210-0x0000000000B20000-0x0000000000C60000-memory.dmp

    Filesize

    1.2MB

  • memory/2716-5186-0x0000000000B20000-0x0000000000C60000-memory.dmp

    Filesize

    1.2MB

  • memory/2716-8195-0x0000000000B20000-0x0000000000C60000-memory.dmp

    Filesize

    1.2MB

  • memory/2716-12186-0x0000000000B20000-0x0000000000C60000-memory.dmp

    Filesize

    1.2MB

  • memory/2716-1947-0x0000000000B20000-0x0000000000C60000-memory.dmp

    Filesize

    1.2MB

  • memory/2716-4946-0x0000000000B20000-0x0000000000C60000-memory.dmp

    Filesize

    1.2MB

  • memory/2740-12-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/2740-18-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/2840-20-0x00000000011C0000-0x0000000001300000-memory.dmp

    Filesize

    1.2MB