Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 23:18

General

  • Target

    7afea8b1228d1b27fd21eb796681e8dc5b54afd3ea6be76d4dbc46c10a9486db.exe

  • Size

    549KB

  • MD5

    59f783e86b9b31bab93e088d89dec539

  • SHA1

    ccf3218db99c6a1683ad18e071609ad3e78d1f77

  • SHA256

    7afea8b1228d1b27fd21eb796681e8dc5b54afd3ea6be76d4dbc46c10a9486db

  • SHA512

    8d0621c33e69f37674e9006c9b7145bf8ca913772a5cf488def709d77fb42a95aa9224a3a4b886dd7ba800208a3bf9456f6cb5d55589f63e74654094b4c560d0

  • SSDEEP

    12288:vvbxYX7ZiymOcB+pwPprnVmLmDsC+FU+ZOSzDBtzY7UWfR2p:nLOsDFncLmKDZOSz1FO5w

Score
9/10

Malware Config

Signatures

  • Renames multiple (5019) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7afea8b1228d1b27fd21eb796681e8dc5b54afd3ea6be76d4dbc46c10a9486db.exe
    "C:\Users\Admin\AppData\Local\Temp\7afea8b1228d1b27fd21eb796681e8dc5b54afd3ea6be76d4dbc46c10a9486db.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:1444
    • C:\Users\Admin\AppData\Local\Temp\_vcredist_x86.exe
      "_vcredist_x86.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:228
      • C:\Users\Admin\AppData\Local\Temp\_vcredist_x86.exe
        "C:\Users\Admin\AppData\Local\Temp\_vcredist_x86.exe" -burn.unelevated BurnPipe.{F065E166-322C-4BFB-B904-CC72ED68CF80} {E67E2647-1745-48FD-92BC-F15CC2BC51D0} 228
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1176886754-713327781-2233697964-1000\desktop.ini.exe

    Filesize

    99KB

    MD5

    23a18aa0a9592cfb4d234a3542d41c00

    SHA1

    68ca729917cbfd485c9d79ff614dc9e0414ee029

    SHA256

    092835206e73ee2a07ea69284d7e13fcecddd7d40c0575b8dc3cebcf65a36f31

    SHA512

    5323640b04778f5990c84ea657ec73d01e5e687212d6ea1a38860fd5f182bb8e2984e2b10b63bcff8563d4f484e911ca8f630b7a104d876b84efcbfcb984fa58

  • C:\Users\Admin\AppData\Local\Temp\_vcredist_x86.exe

    Filesize

    450KB

    MD5

    2335ab0c0e19c0ef416d07df66fee649

    SHA1

    1e8794aff453f7647a6c149f3d38f7a3ff4ccd1b

    SHA256

    f0e46c0f9b2991fa6d187c6b2bed28139c67804cc58cc45c77f06a6f217cb21a

    SHA512

    518580d7a0d8f9610c8ec0204ae879a91a24325fb5e45348e6f0769aa25a69525992bc0f722df113993aa29a1a917de8fbecfb39d547d6f25354c3488bf06a62

  • C:\Users\Admin\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\.ba1\logo.png

    Filesize

    1KB

    MD5

    d6bd210f227442b3362493d046cea233

    SHA1

    ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

    SHA256

    335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

    SHA512

    464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

  • C:\Users\Admin\AppData\Local\Temp\{f65db027-aff3-4070-886a-0d87064aabb1}\.ba1\wixstdba.dll

    Filesize

    117KB

    MD5

    a52e5220efb60813b31a82d101a97dcb

    SHA1

    56e16e4df0944cb07e73a01301886644f062d79b

    SHA256

    e7c8e7edd9112137895820e789baaaeca41626b01fb99fede82968ddb66d02cf

    SHA512

    d6565ba18b5b9795d6bde3ef94d8f7cd77bf8bb69ba3fe7adefb80fc7c5d888cdfdc79238d86a0839846aea4a1e51fc0caed3d62f7054885e8b15fad9f6c654e

  • C:\Windows\SysWOW64\Zombie.exe

    Filesize

    98KB

    MD5

    87e049763d5520b546f9042207c41f58

    SHA1

    0893329160692cb00a77f50eb13f2700225cd9eb

    SHA256

    e7d28262f029390d40abaf9542523a4991010e9b51d36d6036201cd67af9652e

    SHA512

    ce157fd3228851e1c95ad8d6e696b993f61e6973d9b482dd7275ad9df4f1ad0ea005d17e24faa79346b68738c45da32d29fbec452f1a321c64f24860e9e1a65f