Analysis

  • max time kernel
    153s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2024 16:24

General

  • Target

    56f16414e71c5263c57a4ce7733c70b5.exe

  • Size

    217KB

  • MD5

    56f16414e71c5263c57a4ce7733c70b5

  • SHA1

    d74ea238db6e0870422f6dcc4fef83964a380d1a

  • SHA256

    821945dd5882aad4181fcb2670a26cc322224f9f677e5df26f7e708ced0ab6a3

  • SHA512

    a492452c26f6c6d36853edcd13db03645442ea82c761940a1c0f96bc0fab7269fbb99c2e83350ecc06143cb142ddcadc6fce2ea32312440fc985b163b60d46ca

  • SSDEEP

    6144:dC61i972KJmciP8yGw44DQFu/U3buRKlemZ9DnGAe6MTgGkT/+:dK972P/kyGv4DQFu/U3buRKlemZ9DnGm

Score
10/10

Malware Config

Signatures

  • Detects Zeppelin payload 4 IoCs
  • Zeppelin Ransomware

    Ransomware-as-a-service (RaaS) written in Delphi and first seen in 2019.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56f16414e71c5263c57a4ce7733c70b5.exe
    "C:\Users\Admin\AppData\Local\Temp\56f16414e71c5263c57a4ce7733c70b5.exe"
    1⤵
    • Enumerates connected drives
    • Modifies system certificate store
    PID:2276
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete
      2⤵
        PID:776
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2276 -s 1620
        2⤵
        • Program crash
        PID:1496

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9f2134718f844ffbe17b489fccd81b15

      SHA1

      3cee591bd4c6811a2e6f2ccc136c5dbc7dd0c1dc

      SHA256

      f6e5662159f3cd1bb3712aa348e66a23d93a2663736b66e13ca03de9623e460f

      SHA512

      5cedd30a0c0256b093537e4ebd7680c97084ce8ad7ceabeaa94f1c62ada2ff449c4a6c32df758c667efa4dd367f0d763a79b6205a45719a6a50349ea6d72e207

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6d409f3ccf405b2cd24e2034d8fc3d1f

      SHA1

      a2862840792a161665c11038481f29c7f6fbfb6a

      SHA256

      690c808d9bcb007e5650a5ab88b8193f29051f332f73beb48d8ab6221cf6dae7

      SHA512

      011abced415d89b79648d1ed6543d35d9635291542864aeb0738898faf7ffeda1d016442f424152571650cc57322807912ba232ecab81c061ce59fc0482f7caf

    • C:\Users\Admin\AppData\Local\Temp\Cab64AE.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar64FF.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • memory/2276-54-0x00000000003C0000-0x0000000000502000-memory.dmp

      Filesize

      1.3MB

    • memory/2276-62-0x00000000003C0000-0x0000000000502000-memory.dmp

      Filesize

      1.3MB

    • memory/2276-132-0x00000000003C0000-0x0000000000502000-memory.dmp

      Filesize

      1.3MB

    • memory/2276-135-0x00000000003C0000-0x0000000000502000-memory.dmp

      Filesize

      1.3MB