Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/06/2024, 00:09

General

  • Target

    99368b347d3b694e80673c97cd28ada9a552eb3af8c0d5d3ec64d7da502a28e8.exe

  • Size

    224KB

  • MD5

    b37893cc2798e37665e3d62e4ea527cd

  • SHA1

    2d942e4b5ea3c336829a736201c3ece779c6fcb4

  • SHA256

    99368b347d3b694e80673c97cd28ada9a552eb3af8c0d5d3ec64d7da502a28e8

  • SHA512

    eb5c6851c110037e56e00399b3ec16f705887be30ff91671975a570033e435b03fd6f61a152c7854ec2cdeb5bd8b2184834768865b348823ebd8acef885bc8b9

  • SSDEEP

    3072:6DWp2R9vHpKmEGCLOwstyhZFChcssc56FUrgxvbSD4UQrO2ixMF:d29/pKvShcHUaZ

Score
9/10

Malware Config

Signatures

  • Renames multiple (4839) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99368b347d3b694e80673c97cd28ada9a552eb3af8c0d5d3ec64d7da502a28e8.exe
    "C:\Users\Admin\AppData\Local\Temp\99368b347d3b694e80673c97cd28ada9a552eb3af8c0d5d3ec64d7da502a28e8.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3480
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:1796
    • C:\Users\Admin\AppData\Local\Temp\_cup.exe
      "_cup.exe"
      2⤵
      • Executes dropped EXE
      PID:2580
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1032,i,4778049104057176787,6631751660692402210,262144 --variations-seed-version --mojo-platform-channel-handle=4188 /prefetch:8
    1⤵
      PID:572

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\$Recycle.Bin\S-1-5-21-3665033694-1447845302-680750983-1000\desktop.ini.exe

            Filesize

            81KB

            MD5

            a3b25431ca73fcbf859fa45615a9a819

            SHA1

            e70113e9aeb126d376515d1c81515afcf8939e2a

            SHA256

            dd5f1ad44ac7040379ed516c90f4c269c7dfba89e9dc8a1a51712a7e0906de71

            SHA512

            850a70257de1f6c499618430ef21723a55488623cf3b0694d88d27cafdea97979d88c1a0f5fa040353540ee64c527b7d6b2b93718316f625c3aaba58d7dd2836

          • C:\Users\Admin\AppData\Local\Temp\_cup.exe

            Filesize

            143KB

            MD5

            38f108cddb6619fba80f8382d5227ece

            SHA1

            12fd277bf756f22cfae3043900e4aff8b9f05ed9

            SHA256

            8296fe257b8c34398e3f291764454ec3cd9cbe06d60989b632ef4ba6c73ae5dc

            SHA512

            3db732c23f10122c78cffc6b6a5b11836ade1a23f5c6f9a192f2be2fa99c5bd7afb7a9e29c5d518a888cdd2091f9ac41b244214be226152830e96f5ec2cca424

          • C:\Windows\SysWOW64\Zombie.exe

            Filesize

            81KB

            MD5

            0a87e06d5a935342aab8136026b46979

            SHA1

            190824424bbe2629e22c84629bfc1c8dba87eecc

            SHA256

            e66a56fd82ed90aa50a1f38dc33658768e4d97604bac556f7fec7f49a7213669

            SHA512

            7622ba60fd6c62a35c82429a885ba57e46c76aad0b48ad4053169a5457f6612c78a1bd614cf78d87f10ec5b5d37ff3b096dcbc4c01e72084b5e5f00b5d1fa8e5

          • memory/2580-24-0x00007FFB91823000-0x00007FFB91825000-memory.dmp

            Filesize

            8KB

          • memory/2580-21-0x0000000000930000-0x0000000000958000-memory.dmp

            Filesize

            160KB