Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 23:26
Static task
static1
Behavioral task
behavioral1
Sample
759b06eab7ebf0dde75a00c2737ea15ebe528fee415962bab23329363b7e1eb7.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
759b06eab7ebf0dde75a00c2737ea15ebe528fee415962bab23329363b7e1eb7.exe
Resource
win10v2004-20240412-en
General
-
Target
759b06eab7ebf0dde75a00c2737ea15ebe528fee415962bab23329363b7e1eb7.exe
-
Size
390KB
-
MD5
60e1792058c82af983b1c31ef587f2f3
-
SHA1
49b08031f9f245addf076a89165075c40fbe7d5e
-
SHA256
759b06eab7ebf0dde75a00c2737ea15ebe528fee415962bab23329363b7e1eb7
-
SHA512
f31b66a06209bb289ebbd4e64794aaa57a9b59a85ccc2aae1a7ae1b86dec023fe75b1f2f0cf12dc16d6ac4044b481cc970e641c272eb435c945c2fcdf6f39385
-
SSDEEP
6144:RqKvb0CYJ973e+eKZ25T/4DO/B5fpRr3TmiTVVmVVV8VVNVVVcVVVxVVVPVVlVVG:vvbxYX7Z25j4DO/B5fn5ca
Malware Config
Signatures
-
Renames multiple (5189) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 4852 Zombie.exe 1576 _MpDlpCmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe 759b06eab7ebf0dde75a00c2737ea15ebe528fee415962bab23329363b7e1eb7.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 759b06eab7ebf0dde75a00c2737ea15ebe528fee415962bab23329363b7e1eb7.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\7-Zip\Lang\ka.txt.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pl\WindowsFormsIntegration.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Subscription2-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_Trial-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Standard2019R_Grace-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdO365R_Subscription-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.Excel.DataWarehouse.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\it-IT\msadcor.dll.mui.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\fonts\LucidaBrightRegular.ttf.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp5-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-filesystem-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\vstoee.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.Windows.Extensions.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hans\UIAutomationProvider.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\Microsoft.WindowsDesktop.App.runtimeconfig.json.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_BypassTrial180-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000049\index.win32.bundle.map.tmp Zombie.exe File created C:\Program Files\Common Files\System\de-DE\wab32res.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\clretwrc.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\es\Microsoft.VisualBasic.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019VL_KMS_Client_AE-ul.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\PROOF\msth8EN.DLL.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\VVIEWDWG.DLL.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Threading.Timer.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\java.exe.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\plugin2\npjp2.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_OEM_Perp-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019VL_MAK_AE-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\StandardMSDNR_Retail-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MINSBPROXY.DLL.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\WacLangPack2019Eula.txt.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\ja-JP\TipRes.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\System.Windows.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\cs\UIAutomationProvider.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\de\Microsoft.VisualBasic.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest5-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019VL_MAK_AE-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\WordVL_MAK-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\vfs\Fonts\private\BOOKOSB.TTF.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\nl-NL\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019R_Trial-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_PrepidBypass-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp5-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessVL_MAK-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProVL_MAK-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.contrast-black_scale-100.png.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RHeartbeatConfig.xml.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\msvcr120.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\bin\javaws.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Tw Cen MT.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp5-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Word2019R_Retail-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.OAuth.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL026.XML.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProO365R_SubTest-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\InkObj.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\lt-LT\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hant\UIAutomationClient.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-string-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\api-ms-win-crt-process-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_SubTrial-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PersonalPipcR_OEM_Perp-ul-phn.xrm-ms.tmp Zombie.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1236 wrote to memory of 4852 1236 759b06eab7ebf0dde75a00c2737ea15ebe528fee415962bab23329363b7e1eb7.exe 89 PID 1236 wrote to memory of 4852 1236 759b06eab7ebf0dde75a00c2737ea15ebe528fee415962bab23329363b7e1eb7.exe 89 PID 1236 wrote to memory of 4852 1236 759b06eab7ebf0dde75a00c2737ea15ebe528fee415962bab23329363b7e1eb7.exe 89 PID 1236 wrote to memory of 1576 1236 759b06eab7ebf0dde75a00c2737ea15ebe528fee415962bab23329363b7e1eb7.exe 90 PID 1236 wrote to memory of 1576 1236 759b06eab7ebf0dde75a00c2737ea15ebe528fee415962bab23329363b7e1eb7.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\759b06eab7ebf0dde75a00c2737ea15ebe528fee415962bab23329363b7e1eb7.exe"C:\Users\Admin\AppData\Local\Temp\759b06eab7ebf0dde75a00c2737ea15ebe528fee415962bab23329363b7e1eb7.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4852
-
-
C:\Users\Admin\AppData\Local\Temp\_MpDlpCmd.exe"_MpDlpCmd.exe"2⤵
- Executes dropped EXE
PID:1576
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD513b1db86e174474188eba78ada553a42
SHA1608a95d288699cac774bb5a0d4423220adaba87d
SHA256a0997e1b4190b60750d8bb285691f1f42c05403a5144e108f53e6945d768b319
SHA512fd27087ad248c69fa96f0b395dbea819185f7b04ded13c9b0ef8041214e6821f2598e14117acffe6c5d75d654d6de9bc573fcd04086267d27145c78e714b4d18
-
Filesize
310KB
MD5aaef344fe1fbd85cdaec2ece7fdf873e
SHA1cc9b145e5583afa05b702719a106e6631c960e73
SHA2567dfb66ef0f85b8d86a462386d28bcfec4ce07faed9c0a836b770d11cd36e0ec6
SHA512cf61c40caf6bc9257b27d4c54462632ca18048c9343f09746ef4de7d5c28b9c41b9e245f3ab6624e26156d0a214408fe146ea51c957b5b8aff0bf4e5d5576fcc
-
Filesize
79KB
MD50cb01bdcb90ee87502c652357ae257ae
SHA145245b4d931a4227964422ad3dda8cd2db44701d
SHA256cd3b23e26530a030a1a1fc4415000040c821eb42f47cc0a781e1f1472edccff2
SHA51285d2fb79fd98ef9f3369eff2cb91e8f4e6a277b086ba1cf9f2772e879fc74fd8c65834684cd2340d35cbcad4d6c3541a2696adbb730fa6b29bb6f86ccae974eb