Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    20/07/2024, 08:00

General

  • Target

    6acf84255607a52dfdda206985bb3690N.exe

  • Size

    175KB

  • MD5

    6acf84255607a52dfdda206985bb3690

  • SHA1

    d09166644c61496e1135f7c77dcf15a54c6424a7

  • SHA256

    0c7c7ac6ede0c86216ff5313140c4efdd273bfed688a79ffe1a5f408be392102

  • SHA512

    a49c120a82025072befd7d7587aa5777baa8d4fec24860914309d97d10d08afbf1d88304d7929d4bb0e66cc6ba1f96a8921547c860acb8c5f10bc9696de31dd9

  • SSDEEP

    3072:6pWpdE9tHpKrvGCLOwstyhZFChcssc56FUrgxvbSD4UQrO2ExV:PM95pK7ShcHUay

Score
9/10

Malware Config

Signatures

  • Renames multiple (3276) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6acf84255607a52dfdda206985bb3690N.exe
    "C:\Users\Admin\AppData\Local\Temp\6acf84255607a52dfdda206985bb3690N.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Users\Admin\AppData\Local\Temp\_clist.exe
      "_clist.exe"
      2⤵
      • Executes dropped EXE
      PID:2056
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:1656

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

          Filesize

          33KB

          MD5

          99195126317f5f970a1e14b5305e5e6e

          SHA1

          d2ffc57d8798c9a22122852802d8534c144d5aac

          SHA256

          abaf99cf02814420752067855bde522b378eb0cbe25d7f8b175617da8e3f6491

          SHA512

          7d3d26dd9a7a8ffa91e1b22499a2ebaf941776235e9eac1af02104209ee7b3ed3deb2f1f9dfd7c23779af81f05eb492c1b7429993f8dba538d7c0cbf848542d0

        • \Users\Admin\AppData\Local\Temp\_clist.exe

          Filesize

          143KB

          MD5

          b27ea830fb39bc056e65f9a2260ae216

          SHA1

          b69e40ee5cabe0721d2d1e9fbdd4088fd87592d6

          SHA256

          fb7fab836f744d669451dcd38aa7d2a9c74c6af893c258d079439b58abce70d8

          SHA512

          22cad79d90a949174828ee5e3ce621113591c7c991c55c1a6a44a4555002adeb3bcbd9bab6cfbbfdefd663b76ac2dae96d70a01c527b312c7e8d223334a30219

        • \Windows\SysWOW64\Zombie.exe

          Filesize

          32KB

          MD5

          530b19281eae850f73c5f0c495a31fd9

          SHA1

          7561048e943180db635aa80a4bcd14419f3b6a0e

          SHA256

          bc224f37c3d874019d385f08a2a25c462effecdd6f891de4bafc966ba56c9d3e

          SHA512

          fb539e5a525b85c96849e57a4ce61d491649e4922aa10addcacbc72621d9b3c2740a19532056538fed59a63174f94b6939a7502801aafd80e270bc9cd2311cc2

        • memory/2056-19-0x000007FEF59C3000-0x000007FEF59C4000-memory.dmp

          Filesize

          4KB

        • memory/2056-20-0x0000000000280000-0x00000000002A8000-memory.dmp

          Filesize

          160KB