Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:10
Behavioral task
behavioral1
Sample
7482ef1acb27564cbd55a257ba8058074eaa1559c3c708d32ef303f6a477b282.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7482ef1acb27564cbd55a257ba8058074eaa1559c3c708d32ef303f6a477b282.exe
Resource
win10v2004-20240508-en
General
-
Target
7482ef1acb27564cbd55a257ba8058074eaa1559c3c708d32ef303f6a477b282.exe
-
Size
122KB
-
MD5
6c4205f82be1c7fdef73485523b85cba
-
SHA1
e63b335dce9f56fccae4a061a1637b94d78889ef
-
SHA256
7482ef1acb27564cbd55a257ba8058074eaa1559c3c708d32ef303f6a477b282
-
SHA512
7a5e71f2bed094efe3c07ea5d812e5cabc29b853b8ee0282add6d58440f03d3fb36d272f70385b3929191d495db52c9e2319c94922bbae2ad11e0b59c926a0a2
-
SSDEEP
1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q1pkdv5+I8K/XCKCGSqzVp:+nyiQSo1Iv5+ufC58/
Malware Config
Signatures
-
Renames multiple (3749) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
UPX dump on OEP (original entry point) 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2880-0-0x0000000000400000-0x000000000040B000-memory.dmp UPX \Windows\SysWOW64\Zombie.exe UPX C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmp UPX behavioral1/memory/2880-22-0x0000000000400000-0x000000000040B000-memory.dmp UPX -
Executes dropped EXE 2 IoCs
Processes:
_createdump.exeZombie.exepid process 2072 _createdump.exe 2292 Zombie.exe -
Loads dropped DLL 4 IoCs
Processes:
7482ef1acb27564cbd55a257ba8058074eaa1559c3c708d32ef303f6a477b282.exepid process 2880 7482ef1acb27564cbd55a257ba8058074eaa1559c3c708d32ef303f6a477b282.exe 2880 7482ef1acb27564cbd55a257ba8058074eaa1559c3c708d32ef303f6a477b282.exe 2700 2880 7482ef1acb27564cbd55a257ba8058074eaa1559c3c708d32ef303f6a477b282.exe -
Processes:
resource yara_rule behavioral1/memory/2880-0-0x0000000000400000-0x000000000040B000-memory.dmp upx \Windows\SysWOW64\Zombie.exe upx C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmp upx behavioral1/memory/2880-22-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
Processes:
7482ef1acb27564cbd55a257ba8058074eaa1559c3c708d32ef303f6a477b282.exedescription ioc process File created C:\Windows\SysWOW64\Zombie.exe 7482ef1acb27564cbd55a257ba8058074eaa1559c3c708d32ef303f6a477b282.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 7482ef1acb27564cbd55a257ba8058074eaa1559c3c708d32ef303f6a477b282.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Zombie.exedescription ioc process File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\System.Printing.resources.dll.tmp Zombie.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.DirectoryServices.AccountManagement.dll.tmp Zombie.exe File created C:\Program Files\Windows Media Player\ja-JP\wmpnssci.dll.mui.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\highDpiImageSwap.js.tmp Zombie.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\es-ES\rtscom.dll.mui.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\ur.pak.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\psfontj2d.properties.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-keyring.xml.tmp Zombie.exe File created C:\Program Files\LockPush.bin.tmp Zombie.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\WindowsFormsIntegration.resources.dll.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\vlc.mo.tmp Zombie.exe File created C:\Program Files\Windows NT\TableTextService\it-IT\TableTextService.dll.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationUp_SelectionSubpicture.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-io-ui_zh_CN.jar.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\management-agent.jar.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\America\Costa_Rica.tmp Zombie.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Web.DynamicData.dll.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\jquery-ui-1.8.13.custom.css.tmp Zombie.exe File created C:\Program Files\DisablePing.htm.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\1047x576black.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\Passport.wmv.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-icons_ffd27a_256x240.png.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\cpu.css.tmp Zombie.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\VDK10.SYX.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-core-io-ui.xml.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-coredump_ja.jar.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\Pacific\Wallis.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\locale\core_ja.jar.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\locale\es\LC_MESSAGES\vlc.mo.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_filter\libmotionblur_plugin.dll.tmp Zombie.exe File created C:\Program Files\Windows Journal\NBMapTIP.dll.tmp Zombie.exe File created C:\Program Files\Windows Media Player\de-DE\wmpnetwk.exe.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\OFFICE14\CsiSoap.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\jfxwebkit.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.help.ui.nl_ja_4.4.0.v20140623020002.jar.tmp Zombie.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annots.api.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\America\New_York.tmp Zombie.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\UIAutomationProvider.resources.dll.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libscaletempo_plugin.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages.properties.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-core.xml.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\management\jmxremote.access.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ecf.provider.filetransfer.httpclient4.ssl_1.0.0.v20140827-1444.jar.tmp Zombie.exe File created C:\Program Files\Java\jre7\bin\libxml2.dll.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\America\Argentina\Tucuman.tmp Zombie.exe File created C:\Program Files\Microsoft Games\More Games\de-DE\MoreGames.dll.mui.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_output\libglinterop_dxva2_plugin.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\msadcs.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Guayaquil.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.browser.jdp_5.5.0.165303.jar.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\settings.html.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\flyout.css.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\win32_MoveNoDrop32x32.gif.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_filter\libhqdn3d_plugin.dll.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\br.txt.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\setNetworkClientCP.bat.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_ru.jar.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.publisher.nl_zh_4.4.0.v20140623020002.jar.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-options-keymap.xml.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\jfluid-server-15.jar.tmp Zombie.exe File created C:\Program Files\Mozilla Firefox\firefox.exe.sig.tmp Zombie.exe File created C:\Program Files\Windows Defender\MpSvc.dll.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Notebook.jpg.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Title_Page_PAL.wmv.tmp Zombie.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
7482ef1acb27564cbd55a257ba8058074eaa1559c3c708d32ef303f6a477b282.exedescription pid process target process PID 2880 wrote to memory of 2072 2880 7482ef1acb27564cbd55a257ba8058074eaa1559c3c708d32ef303f6a477b282.exe _createdump.exe PID 2880 wrote to memory of 2072 2880 7482ef1acb27564cbd55a257ba8058074eaa1559c3c708d32ef303f6a477b282.exe _createdump.exe PID 2880 wrote to memory of 2072 2880 7482ef1acb27564cbd55a257ba8058074eaa1559c3c708d32ef303f6a477b282.exe _createdump.exe PID 2880 wrote to memory of 2072 2880 7482ef1acb27564cbd55a257ba8058074eaa1559c3c708d32ef303f6a477b282.exe _createdump.exe PID 2880 wrote to memory of 2292 2880 7482ef1acb27564cbd55a257ba8058074eaa1559c3c708d32ef303f6a477b282.exe Zombie.exe PID 2880 wrote to memory of 2292 2880 7482ef1acb27564cbd55a257ba8058074eaa1559c3c708d32ef303f6a477b282.exe Zombie.exe PID 2880 wrote to memory of 2292 2880 7482ef1acb27564cbd55a257ba8058074eaa1559c3c708d32ef303f6a477b282.exe Zombie.exe PID 2880 wrote to memory of 2292 2880 7482ef1acb27564cbd55a257ba8058074eaa1559c3c708d32ef303f6a477b282.exe Zombie.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7482ef1acb27564cbd55a257ba8058074eaa1559c3c708d32ef303f6a477b282.exe"C:\Users\Admin\AppData\Local\Temp\7482ef1acb27564cbd55a257ba8058074eaa1559c3c708d32ef303f6a477b282.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\_createdump.exe"_createdump.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmpFilesize
66KB
MD50c2a8472c3d5d6a2e4801d4fddacc8ed
SHA1b5ccfd947da2f045b4b803cd8099489cd0e80381
SHA256240b4fa753c89adae1da9f213df6205f1550048db0c827728e5c14f62896342e
SHA5127c3d6321014e9916fe059ef0d0eb6567bf41f8735506c1130056a6082bc4794a6fe6ae99d15c4eb5503858f6bc4e1ab31864dfb8e68e2c1491de964f71d46d15
-
C:\Users\Admin\AppData\Local\Temp\_createdump.exeFilesize
56KB
MD5a05b36f6129223951282f9df776761b1
SHA1ec87fa41a670cffa5d77f64366fe109278661f2c
SHA2565113e7ae92f3a7aebc7f8e363209866d4d743b06a26c67e0886979a56fd3a10d
SHA51238b588b28057994305a3abc37d98770ab7ff905cba6da35e91b2936b99823955fc91b90a23174d53337dd62e320b9bac066b76734bf657de9fad6d37071c70da
-
\Windows\SysWOW64\Zombie.exeFilesize
66KB
MD50e6c53169898c8e861fc73ba8be45a4b
SHA11046b149e7b5f457223540c61d0d0fcfa3ede1c3
SHA2563ef8f9bd19e82309db29f8d4b7f239fcf14a8ea410d1558a53d637141b74ab5f
SHA512fdaa58e47c535db24a6e50f032c7d286a7a07c3d3a64b8f20457e7d1e52760e0a6b1286dfc9d6fcfae73b5b956c66cefd015f1ef7a12e0e1e8f397dee1c3323f
-
memory/2880-0-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/2880-14-0x00000000003F0000-0x00000000003FB000-memory.dmpFilesize
44KB
-
memory/2880-22-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB