Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    16/07/2024, 08:12

General

  • Target

    91725855b62b4a8e6fdb576a1a4f8930N.exe

  • Size

    219KB

  • MD5

    91725855b62b4a8e6fdb576a1a4f8930

  • SHA1

    7dae4db9e1c58de21a74b10f4e7bb46dde875bdb

  • SHA256

    e76aea8f8b3f8c2a1f1dd147604fea6154838c1eaf63c084103e476c6125835f

  • SHA512

    e2116cf004b69709dffe508bc5494e1712d5112b01d0b32bc2dd2558dfd64f36daf329ddb918a41e2882475b1b21748f9bf458178295b82ad172e2dba55addba

  • SSDEEP

    3072:6DWpvD98HpKI6GCLOwstyhZFChcssc56FUrgxvbSD4UQrO2Lxh:dF9GpKbShcHUar

Score
9/10

Malware Config

Signatures

  • Renames multiple (2836) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\91725855b62b4a8e6fdb576a1a4f8930N.exe
    "C:\Users\Admin\AppData\Local\Temp\91725855b62b4a8e6fdb576a1a4f8930N.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:1840
    • C:\Users\Admin\AppData\Local\Temp\_choco.exe
      "_choco.exe"
      2⤵
      • Executes dropped EXE
      PID:3068

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    76KB

    MD5

    dae28563e32b5c25c6f9a51117fc3816

    SHA1

    804115a503e1a1b9d09cfde8171072217a35ab77

    SHA256

    8a30ee9c65d475ae16bea2c7f9c6c30f45232ecdd4df0c1f52a95c465cdd22f6

    SHA512

    df3345b2143222fa6bc889a811288c3572eba4d1c6ea9a5058f702ba8c5a24b6c0e1c491269cc6de4948300d05462a4a0f1b8be3013a5685e125294b4e0c2804

  • C:\Users\Admin\AppData\Local\Temp\_choco.exe

    Filesize

    142KB

    MD5

    81a7c181639679983efb07c2dea2ebd0

    SHA1

    93370e8e5cb0d89bf6786445f94dd02dbb84b574

    SHA256

    8320c7f90f65b48e4031b680506a9579751789ded4d90fa2fbfc2fb7db7e3ec8

    SHA512

    599cca13e527c92cdf88df06ed8a01eee1bc602c565ab69e251f7414e19833ce42f0453771bfdf27d16f9f70112835b599d26a6ed92901fdf86bbdf8adf4d2f7

  • C:\Windows\SysWOW64\Zombie.exe

    Filesize

    76KB

    MD5

    e548decc1323de0d36504da48b7f3047

    SHA1

    075634b367df5a677f8521ff94037c0ac99ce227

    SHA256

    264562604ef29dd72af54be9668476892fc830ae9971cd986621f2ee566d6785

    SHA512

    bbbaaf46632a3a65b0e66d3519ef678e9bd588c818a0c084603cd794c651fd503ee4414ee35442c297381730481c022068180c19051f3599eaf47431020a1eb6

  • memory/3068-19-0x000007FEF6343000-0x000007FEF6344000-memory.dmp

    Filesize

    4KB

  • memory/3068-20-0x0000000000A60000-0x0000000000A88000-memory.dmp

    Filesize

    160KB