Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 08:22
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f1bbfb1244664890886c4856cf8f1a50.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.f1bbfb1244664890886c4856cf8f1a50.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.f1bbfb1244664890886c4856cf8f1a50.exe
-
Size
194KB
-
MD5
f1bbfb1244664890886c4856cf8f1a50
-
SHA1
75629c39a63ade301f7280e0c911bc4e3276885e
-
SHA256
5e31001ae72f205d6e529f3f4d0347867176b1ef500307aa0a9ec5977502bee4
-
SHA512
e7ba58a9107686903e2b6b5fbb9ba5b775f7bf7a4c5c3123fe34643cc9022f3aab9741e02aefea09a41c1d12135c475b0827013b2c5f8f6ae4f2bbb3d991dc4f
-
SSDEEP
3072:6e7WpmSWfE9tHpKrvGCLOwstyhZFChcssc56FUrgxvbSD4UQrO2Ex1:RqgSWc95pK7ShcHUaq
Malware Config
Signatures
-
Renames multiple (229) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 2636 _clist.exe 2188 Zombie.exe -
Loads dropped DLL 3 IoCs
pid Process 1824 NEAS.f1bbfb1244664890886c4856cf8f1a50.exe 1824 NEAS.f1bbfb1244664890886c4856cf8f1a50.exe 1824 NEAS.f1bbfb1244664890886c4856cf8f1a50.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe NEAS.f1bbfb1244664890886c4856cf8f1a50.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe NEAS.f1bbfb1244664890886c4856cf8f1a50.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\InkObj.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\FlickAnimation.avi.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\baseAltGr_rtl.xml.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwresmlm.dat.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\ShadesOfBlue.jpg.tmp Zombie.exe File created C:\Program Files\7-Zip\7-zip.chm.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\et.txt.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\IPSEventLogMsg.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\fr-FR\msdaprsr.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\ja-JP\msdaremr.dll.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\LightBlueRectangle.PNG.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\bn.txt.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\ja.txt.tmp Zombie.exe File created C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\en-US\MSTTSFrontendENU.dll.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\TipTsf.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\de-DE\msaddsr.dll.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyScenesBackground_PAL.wmv.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\highlight.png.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\eu.txt.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\en-US\msadcfr.dll.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\fr-FR\WMM2CLIP.dll.mui.tmp Zombie.exe File created C:\Program Files\CompleteSelect.eps.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\be.txt.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsrus.xml.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\en-US\msdaprsr.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\TipRes.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Connectivity.gif.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.jpg.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Tiki.gif.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\es-ES\msaddsr.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\FlickLearningWizard.exe.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsdeu.xml.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsnor.xml.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\sqloledb.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\wab32res.dll.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\OFFICE14\msoshext.dll.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\GreenBubbles.jpg.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_uparrow.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BlackRectangle.bmp.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\TipRes.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwresslm.dat.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\InputPersonalization.exe.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\16_9-frame-background.png.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\TipBand.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols.xml.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\de-DE\sqlxmlx.rll.mui.tmp Zombie.exe File created C:\Program Files\desktop.ini.tmp Zombie.exe File created C:\Program Files\DVD Maker\en-US\OmdProject.dll.mui.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\hr.txt.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\InkObj.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\VSTO\vstoee100.tlb.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwrusash.dat.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Shorthand.emf.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\pa-in.txt.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\InputPersonalization.exe.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwruksh.dat.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsjpn.xml.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Graph.emf.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\Filters\VISFILT.DLL.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\IPSEventLogMsg.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwrenalm.dat.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\TipRes.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\System\ado\msado21.tlb.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Circle_ButtonGraphic.png.tmp Zombie.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1824 wrote to memory of 2636 1824 NEAS.f1bbfb1244664890886c4856cf8f1a50.exe 28 PID 1824 wrote to memory of 2636 1824 NEAS.f1bbfb1244664890886c4856cf8f1a50.exe 28 PID 1824 wrote to memory of 2636 1824 NEAS.f1bbfb1244664890886c4856cf8f1a50.exe 28 PID 1824 wrote to memory of 2636 1824 NEAS.f1bbfb1244664890886c4856cf8f1a50.exe 28 PID 1824 wrote to memory of 2188 1824 NEAS.f1bbfb1244664890886c4856cf8f1a50.exe 29 PID 1824 wrote to memory of 2188 1824 NEAS.f1bbfb1244664890886c4856cf8f1a50.exe 29 PID 1824 wrote to memory of 2188 1824 NEAS.f1bbfb1244664890886c4856cf8f1a50.exe 29 PID 1824 wrote to memory of 2188 1824 NEAS.f1bbfb1244664890886c4856cf8f1a50.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f1bbfb1244664890886c4856cf8f1a50.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f1bbfb1244664890886c4856cf8f1a50.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\_clist.exe"_clist.exe"2⤵
- Executes dropped EXE
PID:2636
-
-
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2188
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD521c975831bed9b49265634408743bb38
SHA1cbe6caeae7ea07cd80077608de77a935017a19d0
SHA256735562cc4bad99d53361f94732faf7b135a25ac3edbb6eb1e8448ac725425c10
SHA51284cfc15893f91da763e3fa34a5a594a7bc162f3b4646ced2f827eab50ed1a2c701aa09cef513df0acb15c5ea702e44c2e6fe9fb82478f513e870445d206ad018
-
Filesize
143KB
MD5b27ea830fb39bc056e65f9a2260ae216
SHA1b69e40ee5cabe0721d2d1e9fbdd4088fd87592d6
SHA256fb7fab836f744d669451dcd38aa7d2a9c74c6af893c258d079439b58abce70d8
SHA51222cad79d90a949174828ee5e3ce621113591c7c991c55c1a6a44a4555002adeb3bcbd9bab6cfbbfdefd663b76ac2dae96d70a01c527b312c7e8d223334a30219
-
Filesize
143KB
MD5b27ea830fb39bc056e65f9a2260ae216
SHA1b69e40ee5cabe0721d2d1e9fbdd4088fd87592d6
SHA256fb7fab836f744d669451dcd38aa7d2a9c74c6af893c258d079439b58abce70d8
SHA51222cad79d90a949174828ee5e3ce621113591c7c991c55c1a6a44a4555002adeb3bcbd9bab6cfbbfdefd663b76ac2dae96d70a01c527b312c7e8d223334a30219
-
Filesize
50KB
MD5c209291356e538a49ff5952f123f6771
SHA1eea21f3861860d0cbf1920752b964eb67dba7160
SHA256a4121425a5e9fec3d82244866e6fa713581dfe6ec621df9c269377e6e8e3bfd6
SHA512ae1a508a1180cb6ea85e6a43b7c664b23a031f98cbc78ead67a87446abd8d486c99a60215e11eecd3d238faf2caf11c363529c8e0b4e49717e4c23ea38033e98
-
Filesize
50KB
MD5c209291356e538a49ff5952f123f6771
SHA1eea21f3861860d0cbf1920752b964eb67dba7160
SHA256a4121425a5e9fec3d82244866e6fa713581dfe6ec621df9c269377e6e8e3bfd6
SHA512ae1a508a1180cb6ea85e6a43b7c664b23a031f98cbc78ead67a87446abd8d486c99a60215e11eecd3d238faf2caf11c363529c8e0b4e49717e4c23ea38033e98
-
Filesize
50KB
MD5c209291356e538a49ff5952f123f6771
SHA1eea21f3861860d0cbf1920752b964eb67dba7160
SHA256a4121425a5e9fec3d82244866e6fa713581dfe6ec621df9c269377e6e8e3bfd6
SHA512ae1a508a1180cb6ea85e6a43b7c664b23a031f98cbc78ead67a87446abd8d486c99a60215e11eecd3d238faf2caf11c363529c8e0b4e49717e4c23ea38033e98
-
Filesize
143KB
MD5b27ea830fb39bc056e65f9a2260ae216
SHA1b69e40ee5cabe0721d2d1e9fbdd4088fd87592d6
SHA256fb7fab836f744d669451dcd38aa7d2a9c74c6af893c258d079439b58abce70d8
SHA51222cad79d90a949174828ee5e3ce621113591c7c991c55c1a6a44a4555002adeb3bcbd9bab6cfbbfdefd663b76ac2dae96d70a01c527b312c7e8d223334a30219
-
Filesize
50KB
MD5c209291356e538a49ff5952f123f6771
SHA1eea21f3861860d0cbf1920752b964eb67dba7160
SHA256a4121425a5e9fec3d82244866e6fa713581dfe6ec621df9c269377e6e8e3bfd6
SHA512ae1a508a1180cb6ea85e6a43b7c664b23a031f98cbc78ead67a87446abd8d486c99a60215e11eecd3d238faf2caf11c363529c8e0b4e49717e4c23ea38033e98
-
Filesize
50KB
MD5c209291356e538a49ff5952f123f6771
SHA1eea21f3861860d0cbf1920752b964eb67dba7160
SHA256a4121425a5e9fec3d82244866e6fa713581dfe6ec621df9c269377e6e8e3bfd6
SHA512ae1a508a1180cb6ea85e6a43b7c664b23a031f98cbc78ead67a87446abd8d486c99a60215e11eecd3d238faf2caf11c363529c8e0b4e49717e4c23ea38033e98