Analysis

  • max time kernel
    144s
  • max time network
    61s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-07-2024 01:31

General

  • Target

    ac6e3d73ba05c9b31aeff8ad1ab28d4ce22cd9664f282af3b7684e5bcdfc0ae3.exe

  • Size

    467KB

  • MD5

    8cf20207163b6c4ac6cf6dddf4ec0335

  • SHA1

    ed9d1422fc9ec20d54a16ec4cac55af7bac225bc

  • SHA256

    ac6e3d73ba05c9b31aeff8ad1ab28d4ce22cd9664f282af3b7684e5bcdfc0ae3

  • SHA512

    b3337078bcf3d27ba67d4f4c9498afa672a2424fe65ad70ae64657515ba918fcdf9de4ec5053d57fd489e703dd5b88b7c29faabe140fc596ba78df651fc2869b

  • SSDEEP

    12288:iFF2uqNUhiHOR4LucvSFSrux88ndNtJXzLFziB:iFF2PUhiHOeE8rin3thLa

Score
9/10

Malware Config

Signatures

  • Renames multiple (4855) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac6e3d73ba05c9b31aeff8ad1ab28d4ce22cd9664f282af3b7684e5bcdfc0ae3.exe
    "C:\Users\Admin\AppData\Local\Temp\ac6e3d73ba05c9b31aeff8ad1ab28d4ce22cd9664f282af3b7684e5bcdfc0ae3.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:3120
    • C:\Users\Admin\AppData\Local\Temp\_AdobeARMHelper.exe
      "_AdobeARMHelper.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4572
      • C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe
        "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:3468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2539840389-1261165778-1087677076-1000\desktop.ini.exe

    Filesize

    80KB

    MD5

    59670d7a94544c1b6d4200997e23be2d

    SHA1

    b560da82696ef745f59369198f35fe2e800c42ca

    SHA256

    6d05d3a58eaf877b4fd992a6da77eb4bd0f0182ebbb48785179fdc0d83c9a755

    SHA512

    5e838eaacb0f200452ffaf1c8b1d7f8e75b0f3c0d605c6fd5de5b41a627b42ba0ebf1970e9c010ff57b1e66225e8f27185acf57d3c17152ed5deeec8f15de5c1

  • C:\Users\Admin\AppData\Local\Temp\AdobeARM.log

    Filesize

    178B

    MD5

    f8d4127dbc82b43639f8aa3257d46837

    SHA1

    cea55c82102f51b260d3bd51b702846717793d17

    SHA256

    48502bef4cb1490defc0884ab8700800b5b5549dffbec984cce2c138f6d35a09

    SHA512

    32bbd8f487c74548230ffb55ca76addbd162bd93aa5c1321834b2d5e3ded32f7febc405aa9ebf8201fa46c84ef98873f59ee8fc1b8e4f065e25baf21cea4f406

  • C:\Users\Admin\AppData\Local\Temp\ArmUI.ini

    Filesize

    251KB

    MD5

    864c22fb9a1c0670edf01c6ed3e4fbe4

    SHA1

    bf636f8baed998a1eb4531af9e833e6d3d8df129

    SHA256

    b4d4dcd9594d372d7c0c975d80ef5802c88502895ed4b8a26ca62e225f2f18b0

    SHA512

    ff23616ee67d51daa2640ae638f59a8d331930a29b98c2d1bd3b236d2f651f243f9bae38d58515714886cfbb13b9be721d490aad4f2d10cbba74d7701ab34e09

  • C:\Users\Admin\AppData\Local\Temp\_AdobeARMHelper.exe

    Filesize

    387KB

    MD5

    c18baf4d858b36dbf1e679c79c659a70

    SHA1

    f5638a26a57a9ef9dbfb0b1a324c13f2b548f308

    SHA256

    843dd18df8fd40e9e8ab2cecc52c03f2e95b0c2933162ba860d83e23c207b82c

    SHA512

    a46d780398f5066a90de5e0772a0a0f55f802dca023e8c90db271507aacec8f73a6f3a8cbd086031235e2037eab83975b68e52c17519efc4c6148b48f2ad2ee2

  • C:\Windows\SysWOW64\Zombie.exe

    Filesize

    80KB

    MD5

    cee3d3936b76117281699bcef8345216

    SHA1

    8bb1aaf10c93a02b0340c9b57487635ff4a5a623

    SHA256

    51a4f37d183ef2d73f15442c5d6ad4e607b438ac970264470a7c8fd85c455962

    SHA512

    cb3f9b21d7e588c3edc37423f1a93b4e9ed43d859ac1cef3a62e4b9833438dc1694ae44532f235e328dedfa6a089f2c9829ab966da823790d574e22c3132bf9c