Analysis
-
max time kernel
147s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 22:47
Static task
static1
Behavioral task
behavioral1
Sample
85ec814a34c76a7f2ea917921dd45bbe1483b1a4185c4949fad389d640e9004e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
85ec814a34c76a7f2ea917921dd45bbe1483b1a4185c4949fad389d640e9004e.exe
Resource
win10v2004-20240226-en
General
-
Target
85ec814a34c76a7f2ea917921dd45bbe1483b1a4185c4949fad389d640e9004e.exe
-
Size
200KB
-
MD5
36f75177303c607fd223bd33753ecf38
-
SHA1
519fc959fa7c4dd4ae84e2862cd9168a9ea8490c
-
SHA256
85ec814a34c76a7f2ea917921dd45bbe1483b1a4185c4949fad389d640e9004e
-
SHA512
fe2c131adbc8c2b9daa11bfe13d51d8812e829c8124d7ff936b8d19772d990ce642d288616b35d61e40927ffef9b6b14c10ca634e9b17db6d9902223db7cae84
-
SSDEEP
3072:6e7WpXYvnd0D98HpKI6GCLOwstyhZFChcssc56FUrgxvbSD4UQrO2Lxa:RqRSS9GpKbShcHUaM
Malware Config
Signatures
-
Renames multiple (519) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 2980 _choco.exe 2844 Zombie.exe -
Loads dropped DLL 3 IoCs
pid Process 2332 85ec814a34c76a7f2ea917921dd45bbe1483b1a4185c4949fad389d640e9004e.exe 2332 85ec814a34c76a7f2ea917921dd45bbe1483b1a4185c4949fad389d640e9004e.exe 2332 85ec814a34c76a7f2ea917921dd45bbe1483b1a4185c4949fad389d640e9004e.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe 85ec814a34c76a7f2ea917921dd45bbe1483b1a4185c4949fad389d640e9004e.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 85ec814a34c76a7f2ea917921dd45bbe1483b1a4185c4949fad389d640e9004e.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\LogoDev.png.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu.xml.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsptg.xml.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\mip.exe.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\it-IT\msadcor.dll.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\audiodepthconverter.ax.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\title_trans_scene.wmv.tmp Zombie.exe File created C:\Program Files\Internet Explorer\iediagcmd.exe.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2native.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\hy.txt.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipscht.xml.tmp Zombie.exe File created C:\Program Files\Common Files\System\ado\de-DE\msader15.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\System\ado\msader15.dll.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\Notes_content-background.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\NavigationLeft_SelectionSubpicture.png.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\libEGL.dll.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\travel.png.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\es-419.pak.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\InputPersonalization.exe.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_rgb.wmv.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Perf_Scenes_Subpicture1.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_babypink_Thumbnail.bmp.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationUp_SelectionSubpicture.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\sonicsptransform.ax.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\ta.pak.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\delete.avi.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\rtscom.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\zh-phonetic.xml.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\16_9-frame-highlight.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationRight_ButtonGraphic.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\de-DE\WMM2CLIP.dll.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\scrapbook.png.tmp Zombie.exe File created C:\Program Files\Internet Explorer\ieinstal.exe.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\gu.pak.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\cy.txt.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\keypadbase.xml.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\fr-FR\sqlxmlx.rll.mui.tmp Zombie.exe File created C:\Program Files\ConvertFromMount.xps.tmp Zombie.exe File created C:\Program Files\DismountSend.ADT.tmp Zombie.exe File created C:\Program Files\EditStop.dib.tmp Zombie.exe File created C:\Program Files\ExitUnblock.3g2.tmp Zombie.exe File created C:\Program Files\Internet Explorer\sqmapi.dll.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationRight_ButtonGraphic.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\ParentMenuButtonIcon.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\1047x576black.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SceneButtonInset_Alpha1.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\TravelIntroToMain_PAL.wmv.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\fi.pak.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_fr.jar.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\handler.reg.tmp Zombie.exe File created C:\Program Files\DVD Maker\fr-FR\DVDMaker.exe.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\16_9-frame-background.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\shadowonlyframe_videoinset.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsita.xml.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\1033\VSTOLoaderUI.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\es-ES\sqlxmlx.rll.mui.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\ms.pak.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\db\RELEASE-NOTES.html.tmp Zombie.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2980 2332 85ec814a34c76a7f2ea917921dd45bbe1483b1a4185c4949fad389d640e9004e.exe 28 PID 2332 wrote to memory of 2980 2332 85ec814a34c76a7f2ea917921dd45bbe1483b1a4185c4949fad389d640e9004e.exe 28 PID 2332 wrote to memory of 2980 2332 85ec814a34c76a7f2ea917921dd45bbe1483b1a4185c4949fad389d640e9004e.exe 28 PID 2332 wrote to memory of 2980 2332 85ec814a34c76a7f2ea917921dd45bbe1483b1a4185c4949fad389d640e9004e.exe 28 PID 2332 wrote to memory of 2844 2332 85ec814a34c76a7f2ea917921dd45bbe1483b1a4185c4949fad389d640e9004e.exe 29 PID 2332 wrote to memory of 2844 2332 85ec814a34c76a7f2ea917921dd45bbe1483b1a4185c4949fad389d640e9004e.exe 29 PID 2332 wrote to memory of 2844 2332 85ec814a34c76a7f2ea917921dd45bbe1483b1a4185c4949fad389d640e9004e.exe 29 PID 2332 wrote to memory of 2844 2332 85ec814a34c76a7f2ea917921dd45bbe1483b1a4185c4949fad389d640e9004e.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\85ec814a34c76a7f2ea917921dd45bbe1483b1a4185c4949fad389d640e9004e.exe"C:\Users\Admin\AppData\Local\Temp\85ec814a34c76a7f2ea917921dd45bbe1483b1a4185c4949fad389d640e9004e.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\_choco.exe"_choco.exe"2⤵
- Executes dropped EXE
PID:2980
-
-
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2844
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD513ee3aadb7d9463f4620dc0331d869a5
SHA1b34497d21dd1fd903254e9783660a7ab774d5e7a
SHA2564a5664bd6d6ab8c0e2cc6a056d226254594110ada1c21e9f971fcb0fb18af534
SHA512c7a0e0c5aa22ac697b3a50c413028914dd8186ab92870198b8732fb1545dc3fa6ff2d55342403042d6b8d3a29635f9324b078c1970dc8e11cb938c98d2146101
-
Filesize
142KB
MD581a7c181639679983efb07c2dea2ebd0
SHA193370e8e5cb0d89bf6786445f94dd02dbb84b574
SHA2568320c7f90f65b48e4031b680506a9579751789ded4d90fa2fbfc2fb7db7e3ec8
SHA512599cca13e527c92cdf88df06ed8a01eee1bc602c565ab69e251f7414e19833ce42f0453771bfdf27d16f9f70112835b599d26a6ed92901fdf86bbdf8adf4d2f7
-
Filesize
57KB
MD5e77447e219ffb7e6f66ef4c98c646906
SHA10c64a3da22aa1d05edd31f64017539b1aa6f4719
SHA256b7b38dc2670ea1367a13854b3dc034e3aea28eec5f16b345a3c60607b96e2857
SHA5122a23d59a133e16dc944f9aedb525dd307f0cc26efeb97d56ded7c34c5c4ff649741ad3427e090551044b07f0eb622de0d2f36280ce058f9a64d1b7daa76e675c