Overview
overview
10Static
static
10[DemonArch...6d.exe
windows7-x64
10[DemonArch...87.exe
windows7-x64
10[DemonArch...4b.exe
windows7-x64
10[DemonArch...9e.exe
windows7-x64
10[DemonArch...ca.exe
windows7-x64
10[DemonArch...8c.exe
windows7-x64
10[DemonArch...1a.exe
windows7-x64
10[DemonArch...4c.exe
windows7-x64
10[DemonArch...c4.exe
windows7-x64
10[DemonArch...68.exe
windows7-x64
10[DemonArch...50.exe
windows7-x64
10[DemonArch...3e.exe
windows7-x64
10[DemonArch...8b.exe
windows7-x64
10[DemonArch...f0.exe
windows7-x64
10[DemonArch...e1.exe
windows7-x64
10[DemonArch...89.exe
windows7-x64
[DemonArch...e5.exe
windows7-x64
10[DemonArch...85.exe
windows7-x64
10[DemonArch...6b.exe
windows7-x64
10[DemonArch...d0.exe
windows7-x64
10[DemonArch...1e.exe
windows7-x64
10[DemonArch...25.exe
windows7-x64
[DemonArch...31.exe
windows7-x64
9[DemonArch...5f.exe
windows7-x64
10[DemonArch...d3.exe
windows7-x64
10[DemonArch...a5.exe
windows7-x64
10[DemonArch...bb.exe
windows7-x64
3[DemonArch...25.exe
windows7-x64
10[DemonArch...49.exe
windows7-x64
10[DemonArch...4c.exe
windows7-x64
10[DemonArch...ec.exe
windows7-x64
10[DemonArch...ae.exe
windows7-x64
10Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 17:15
Behavioral task
behavioral1
Sample
[DemonArchives]02602e9283805090b671a783870db86d.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
[DemonArchives]0838231d7fbebe340c0ac71db0ef8c87.exe
Resource
win7-20240508-en
Behavioral task
behavioral3
Sample
[DemonArchives]0ad8190f1160f00fc831fb329262724b.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
[DemonArchives]0bcfb8285b7397bcfc2ffb92a6c5ec9e.exe
Resource
win7-20240508-en
Behavioral task
behavioral5
Sample
[DemonArchives]0dbf8f84a143e3e446242938dfd288ca.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
[DemonArchives]13bba40208ea1f05d660ffad53c40c8c.exe
Resource
win7-20240419-en
Behavioral task
behavioral7
Sample
[DemonArchives]1443a4458c2b4af35c618a327b7c411a.exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
[DemonArchives]15282a5c1d8e03a448ebc0b70e702a4c.exe
Resource
win7-20240508-en
Behavioral task
behavioral9
Sample
[DemonArchives]156c78364b84a89c8e61f444c3c620c4.exe
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
[DemonArchives]15ff3ff6cb29ac4c66a558d101e37068.exe
Resource
win7-20240419-en
Behavioral task
behavioral11
Sample
[DemonArchives]18227e20a5e842198e7271ae54397150.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
[DemonArchives]1d957e984fcd6327f30f7006e2d11f3e.exe
Resource
win7-20240419-en
Behavioral task
behavioral13
Sample
[DemonArchives]1e2c3685399d381aa04ba4d70651e38b.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
[DemonArchives]291b00fb921e80b1cf7e8154693947f0.exe
Resource
win7-20240508-en
Behavioral task
behavioral15
Sample
[DemonArchives]2b961a5aadff93e0d87b42e530d5a0e1.exe
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
[DemonArchives]2be60b607087d60c5353062345f97789.exe
Resource
win7-20240611-en
Behavioral task
behavioral17
Sample
[DemonArchives]2e23d0d084cd18f08897dfe509bdd4e5.exe
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
[DemonArchives]2edac22166e0d82bc1c652e331726c85.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
[DemonArchives]31c25cdf7b77267744cdc37912e48d6b.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
[DemonArchives]3265873dd9d9c29a8b14f69efb8df4d0.exe
Resource
win7-20240419-en
Behavioral task
behavioral21
Sample
[DemonArchives]34172ec379dab98d177ab7e31d517b1e.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
[DemonArchives]4cf4cbd1bc2ef0ddfe3530541ffdd925.exe
Resource
win7-20231129-en
Behavioral task
behavioral23
Sample
[DemonArchives]54b9e4e56454226484e80fd01ca03131.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
[DemonArchives]9a4605cedcda1924728fbe58d429915f.exe
Resource
win7-20240220-en
Behavioral task
behavioral25
Sample
[DemonArchives]a2113a088085d07d2d7688ab2b0914d3.exe
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
[DemonArchives]aa18a0770ed7d03bddfb00e126fbbba5.exe
Resource
win7-20240611-en
Behavioral task
behavioral27
Sample
[DemonArchives]ac7cf64a560bda15c281c43780b8d5bb.exe
Resource
win7-20240611-en
Behavioral task
behavioral28
Sample
[DemonArchives]af6fb7fbf240ae2f6490766919b26325.exe
Resource
win7-20231129-en
Behavioral task
behavioral29
Sample
[DemonArchives]b09a0cd1c32edf39308043eed7889449.exe
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
[DemonArchives]b1d6b726bf6ac63749e5eba6b5c7694c.exe
Resource
win7-20240221-en
Behavioral task
behavioral31
Sample
[DemonArchives]b3c170550a1efdf268632916e95ad1ec.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
[DemonArchives]b83b3408e6ade0a5c61c5870208000ae.exe
Resource
win7-20240221-en
General
-
Target
[DemonArchives]54b9e4e56454226484e80fd01ca03131.exe
-
Size
398KB
-
MD5
54b9e4e56454226484e80fd01ca03131
-
SHA1
4fe51686f1184796896952a837006d6a71973c59
-
SHA256
2f04032d41572a957bab7fcb8f2162af3497e6433d1f3ee196aee53e5ef1b85f
-
SHA512
4b401335e5e3e6ee409e44b6cef18023a2c70459fdab52f877e4b60793f9fc2a47551fa9ffc93f754fd4d0a1642fb8cfcc60ef8e79a7a71c0fc29b2c21324c66
-
SSDEEP
6144:AonzSJT/4DO/B52pRr3zmiTVVmVVV8VVNVVVcVVVxVVVPVVlVVVRVVVtVVWV60jJ:XnOJj4DO/B52nZP5
Malware Config
Signatures
-
Renames multiple (3435) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
Processes:
_MpDlpCmd.exeZombie.exepid process 2184 _MpDlpCmd.exe 2204 Zombie.exe -
Loads dropped DLL 5 IoCs
Processes:
[DemonArchives]54b9e4e56454226484e80fd01ca03131.exepid process 3008 [DemonArchives]54b9e4e56454226484e80fd01ca03131.exe 3008 [DemonArchives]54b9e4e56454226484e80fd01ca03131.exe 3008 [DemonArchives]54b9e4e56454226484e80fd01ca03131.exe 3008 [DemonArchives]54b9e4e56454226484e80fd01ca03131.exe 2176 -
Drops file in System32 directory 2 IoCs
Processes:
[DemonArchives]54b9e4e56454226484e80fd01ca03131.exedescription ioc process File created C:\Windows\SysWOW64\Zombie.exe [DemonArchives]54b9e4e56454226484e80fd01ca03131.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe [DemonArchives]54b9e4e56454226484e80fd01ca03131.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Zombie.exedescription ioc process File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-tools_zh_CN.jar.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwrdeush.dat.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\journal.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-application-views_zh_CN.jar.tmp Zombie.exe File created C:\Program Files\Windows Media Player\Media Renderer\DMR_120.jpg.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-uihandler_zh_CN.jar.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-spi-quicksearch_zh_CN.jar.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler_zh_CN.jar.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Shorthand.emf.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Enderbury.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\America\Costa_Rica.tmp Zombie.exe File created C:\Program Files\Windows Defender\es-ES\MsMpRes.dll.mui.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\libavcodec_plugin.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\jdwp.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\date-span-16.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-profiler_ja.jar.tmp Zombie.exe File created C:\Program Files\Java\jre7\bin\net.dll.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\TipRes.dll.tmp Zombie.exe File created C:\Program Files\Java\jre7\bin\fontmanager.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Games\Purble Place\ja-JP\PurblePlace.exe.mui.tmp Zombie.exe File created C:\Program Files\Windows Media Player\de-DE\wmlaunch.exe.mui.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\diner_h.png.tmp Zombie.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\ChkrRes.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\System\ado\en-US\msader15.dll.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationLeft_ButtonGraphic.png.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_wer.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-api-annotations-common.xml.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\Pacific\Galapagos.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\spu\libmarq_plugin.dll.tmp Zombie.exe File created C:\Program Files\Windows Photo Viewer\PhotoBase.dll.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\numbase.xml.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationRight_SelectionSubpicture.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.publisher_1.3.0.v20140911-0143.jar.tmp Zombie.exe File created C:\Program Files\Mozilla Firefox\defaults\pref\channel-prefs.js.tmp Zombie.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\FrameworkList.xml.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-lib-profiler.xml.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\ku.txt.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Title_Page_Ref.wmv.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Yakutat.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Magadan.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\MST7.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Indian\Chagos.tmp Zombie.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\System.Workflow.Runtime.dll.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\access\libsdp_plugin.dll.tmp Zombie.exe File created C:\Program Files\Windows Defender\de-DE\MpEvMsg.dll.mui.tmp Zombie.exe File created C:\Program Files\Windows Media Player\Network Sharing\wmpnss_bw48.bmp.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\deployJava1.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\mailapi.jar.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\month.png.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\skins\skin.catalog.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\feature.properties.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\about.html.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\management\jmxremote.password.template.tmp Zombie.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\System.Data.DataSetExtensions.Resources.dll.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libsamplerate_plugin.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\Office14\GROOVEEX.DLL.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\LogoBeta.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-masterfs-nio2_ja.jar.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\ext\sunmscapi.jar.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\jvm.hprof.txt.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\Urumqi.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\micaut.dll.tmp Zombie.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
[DemonArchives]54b9e4e56454226484e80fd01ca03131.exedescription pid process target process PID 3008 wrote to memory of 2184 3008 [DemonArchives]54b9e4e56454226484e80fd01ca03131.exe _MpDlpCmd.exe PID 3008 wrote to memory of 2184 3008 [DemonArchives]54b9e4e56454226484e80fd01ca03131.exe _MpDlpCmd.exe PID 3008 wrote to memory of 2184 3008 [DemonArchives]54b9e4e56454226484e80fd01ca03131.exe _MpDlpCmd.exe PID 3008 wrote to memory of 2184 3008 [DemonArchives]54b9e4e56454226484e80fd01ca03131.exe _MpDlpCmd.exe PID 3008 wrote to memory of 2204 3008 [DemonArchives]54b9e4e56454226484e80fd01ca03131.exe Zombie.exe PID 3008 wrote to memory of 2204 3008 [DemonArchives]54b9e4e56454226484e80fd01ca03131.exe Zombie.exe PID 3008 wrote to memory of 2204 3008 [DemonArchives]54b9e4e56454226484e80fd01ca03131.exe Zombie.exe PID 3008 wrote to memory of 2204 3008 [DemonArchives]54b9e4e56454226484e80fd01ca03131.exe Zombie.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\[DemonArchives]54b9e4e56454226484e80fd01ca03131.exe"C:\Users\Admin\AppData\Local\Temp\[DemonArchives]54b9e4e56454226484e80fd01ca03131.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\_MpDlpCmd.exe"_MpDlpCmd.exe"2⤵
- Executes dropped EXE
PID:2184
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.tmpFilesize
87KB
MD570fead1a6de5c432ae1ec5116c5039f4
SHA191c99d3f6bdd891907962f2387f1d549685de8e2
SHA256a02adad7b67ea35d143c3a6d732d40c4fbc87209a4def83a2d3931f7f143965d
SHA5122dbcaf92dafba0f1adb5ffc2441542a8c7e12a15027709e91a5be75ac604aa69689440aa494101ccc2fa045b4411a1450a2e1147d443896e7da42d690a064390
-
\Users\Admin\AppData\Local\Temp\_MpDlpCmd.exeFilesize
310KB
MD5c7c81e2467fa619d5b4a03b0fa51519c
SHA139c7ec92e51d72626d4f5d29d80bdf3eb46e8f7c
SHA256e3f1eca768f304512804a54489e8a658e9906e7e0911bb869d03eff140cff5d0
SHA5122438e68ff4cf4bc7d1b8ec9b722e882fa8863cd8690b8c6a03f17d88de1b6eb5697934413ebe4bf1221f1182db841df2ceff4b22a928f577c80968a13b81f8cd
-
\Windows\SysWOW64\Zombie.exeFilesize
87KB
MD54eaf4b911f13079dcc3d9209b736ab00
SHA1bf954a36842a61c5679ecd41fbf12a6017de2323
SHA256da689ddfc0d20c2b3cbbb3e2cb29ec5a401ab257f894913ea3deb680e54084f9
SHA51255721fff26e2bf8dc7a4ffd1f5b46ba308a60b66e2cec7779766e962a2fe6bb641b1c0abd2fea21a51612f2642a7b3596e642ce6484939ac6a530abbb817c234