Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2024 17:15

General

  • Target

    [DemonArchives]54b9e4e56454226484e80fd01ca03131.exe

  • Size

    398KB

  • MD5

    54b9e4e56454226484e80fd01ca03131

  • SHA1

    4fe51686f1184796896952a837006d6a71973c59

  • SHA256

    2f04032d41572a957bab7fcb8f2162af3497e6433d1f3ee196aee53e5ef1b85f

  • SHA512

    4b401335e5e3e6ee409e44b6cef18023a2c70459fdab52f877e4b60793f9fc2a47551fa9ffc93f754fd4d0a1642fb8cfcc60ef8e79a7a71c0fc29b2c21324c66

  • SSDEEP

    6144:AonzSJT/4DO/B52pRr3zmiTVVmVVV8VVNVVVcVVVxVVVPVVlVVVRVVVtVVWV60jJ:XnOJj4DO/B52nZP5

Score
9/10

Malware Config

Signatures

  • Renames multiple (3435) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\[DemonArchives]54b9e4e56454226484e80fd01ca03131.exe
    "C:\Users\Admin\AppData\Local\Temp\[DemonArchives]54b9e4e56454226484e80fd01ca03131.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:2204
    • C:\Users\Admin\AppData\Local\Temp\_MpDlpCmd.exe
      "_MpDlpCmd.exe"
      2⤵
      • Executes dropped EXE
      PID:2184

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.tmp
    Filesize

    87KB

    MD5

    70fead1a6de5c432ae1ec5116c5039f4

    SHA1

    91c99d3f6bdd891907962f2387f1d549685de8e2

    SHA256

    a02adad7b67ea35d143c3a6d732d40c4fbc87209a4def83a2d3931f7f143965d

    SHA512

    2dbcaf92dafba0f1adb5ffc2441542a8c7e12a15027709e91a5be75ac604aa69689440aa494101ccc2fa045b4411a1450a2e1147d443896e7da42d690a064390

  • \Users\Admin\AppData\Local\Temp\_MpDlpCmd.exe
    Filesize

    310KB

    MD5

    c7c81e2467fa619d5b4a03b0fa51519c

    SHA1

    39c7ec92e51d72626d4f5d29d80bdf3eb46e8f7c

    SHA256

    e3f1eca768f304512804a54489e8a658e9906e7e0911bb869d03eff140cff5d0

    SHA512

    2438e68ff4cf4bc7d1b8ec9b722e882fa8863cd8690b8c6a03f17d88de1b6eb5697934413ebe4bf1221f1182db841df2ceff4b22a928f577c80968a13b81f8cd

  • \Windows\SysWOW64\Zombie.exe
    Filesize

    87KB

    MD5

    4eaf4b911f13079dcc3d9209b736ab00

    SHA1

    bf954a36842a61c5679ecd41fbf12a6017de2323

    SHA256

    da689ddfc0d20c2b3cbbb3e2cb29ec5a401ab257f894913ea3deb680e54084f9

    SHA512

    55721fff26e2bf8dc7a4ffd1f5b46ba308a60b66e2cec7779766e962a2fe6bb641b1c0abd2fea21a51612f2642a7b3596e642ce6484939ac6a530abbb817c234