Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 03:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0cc2f587dec522061d984365397cb340.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0cc2f587dec522061d984365397cb340.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
0cc2f587dec522061d984365397cb340.exe
-
Size
847KB
-
MD5
0cc2f587dec522061d984365397cb340
-
SHA1
93c34efeb9efcfa2bdfbb4a50c0ab4b74b954a52
-
SHA256
5b458abfe7cd84787df8a77659729f73c7617b1a54daea04229a24071d7f650d
-
SHA512
1c48fa6ccf5756aa5a46c8e4e9ee9c13af7ba70913fe06c2ae59e2ed07a960cef88112b4b9a41f9855cd5d4c4b2dfa199e522865f3e41cad3604bfa3eaeba886
-
SSDEEP
12288:0Zdo2MjXkEeQGGOgSlDD7GjStd6ZG8yE:lxjXkEeQ1OnD/GjStd6lR
Score
10/10
Malware Config
Signatures
-
Detects Zeppelin payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2132-5-0x0000000000CA0000-0x0000000000DE1000-memory.dmp family_zeppelin -
Zeppelin Ransomware
Ransomware-as-a-service (RaaS) written in Delphi and first seen in 2019.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
0cc2f587dec522061d984365397cb340.exedescription pid Process procid_target PID 2132 wrote to memory of 2672 2132 0cc2f587dec522061d984365397cb340.exe 28 PID 2132 wrote to memory of 2672 2132 0cc2f587dec522061d984365397cb340.exe 28 PID 2132 wrote to memory of 2672 2132 0cc2f587dec522061d984365397cb340.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cc2f587dec522061d984365397cb340.exe"C:\Users\Admin\AppData\Local\Temp\0cc2f587dec522061d984365397cb340.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2132 -s 6562⤵PID:2672
-