Analysis
-
max time kernel
120s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 14:05
Static task
static1
Behavioral task
behavioral1
Sample
d6d63be18cc68af69dbaddf66cb1d960N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d6d63be18cc68af69dbaddf66cb1d960N.exe
Resource
win10v2004-20240709-en
General
-
Target
d6d63be18cc68af69dbaddf66cb1d960N.exe
-
Size
81KB
-
MD5
d6d63be18cc68af69dbaddf66cb1d960
-
SHA1
396e34ab8e05779dc31c63ebac89c498a1de0985
-
SHA256
a90489de733f79dcd0f39fd14d37aeaef37b11ca40a5752e3a48239c684a933d
-
SHA512
10e29001b84595c3916949680a3e80716399c4b284a6b2c2390dc1d5dab8cb0c0a96677b6b8fa7fe8207cc2c3bab0b7d527be23550ac734f4551bb523bd8569c
-
SSDEEP
1536:W7ZhA7pApvOsOKjv46Ov46MbRsjaVZP7iNpW0/137qSez/P:6e7WpPRsjacpW0/5ZebP
Malware Config
Signatures
-
Renames multiple (4653) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 696 Zombie.exe 4212 _MofCompiler.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe d6d63be18cc68af69dbaddf66cb1d960N.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe d6d63be18cc68af69dbaddf66cb1d960N.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\7-Zip\Lang\ca.txt.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.th-th.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\concrt140.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pt-BR\System.Windows.Input.Manipulations.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ko\PresentationUI.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\javacpl.cpl.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LivePersonaCard\images\default\linkedin_logo_large.png.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\NAMECONTROLSERVER.EXE.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_Grace-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\coreclr.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\UIAutomationTypes.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.106\Locales\lv.pak.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\jfxswt.jar.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\api-ms-win-crt-filesystem-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\deploy\[email protected] Zombie.exe File created C:\Program Files\Microsoft Office\root\Integration\C2RManifest.OneNote.OneNote.x-none.msi.16.x-none.xml.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\de-DE\mshwLatin.dll.mui.tmp Zombie.exe File created C:\Program Files\GroupCompress.dib.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\PowerPivotExcelClientAddIn.tlb.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\msvcp140.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\sqloledb.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pt-BR\ReachFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription4-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_Trial-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Security.Cryptography.OpenSsl.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.106\Locales\en-GB.pak.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.Office.Interop.Excel.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MSO0127.ACL.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pl\System.Windows.Controls.Ribbon.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\javafx\public_suffix.md.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365BusinessR_Grace-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription5-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019R_Grace-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\Interceptor.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogoSmall.contrast-black_scale-80.png.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Net.Mail.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\UIAutomationClientSideProviders.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\it\System.Windows.Forms.Primitives.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\AccessR_Retail-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\offsymxb.ttf.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ja\UIAutomationClientSideProviders.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\System.Windows.Forms.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_Trial2-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\WWINTL.DLL.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Client.Models.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\ext\zipfs.jar.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\InkObj.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-crt-conio-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\Microsoft.NETCore.App.deps.json.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Drawing.Primitives.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\System.Security.Cryptography.Pkcs.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\UIAutomationClientSideProviders.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.106\Locales\zh-CN.pak.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription5-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_OEM_Perp-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\pt\msipc.dll.mui.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\az.txt.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ro-ro.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\ja-JP\msadcor.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\cs\UIAutomationTypes.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\System.Windows.Controls.Ribbon.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial2-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.scale-80.png.tmp Zombie.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6d63be18cc68af69dbaddf66cb1d960N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2020 wrote to memory of 696 2020 d6d63be18cc68af69dbaddf66cb1d960N.exe 84 PID 2020 wrote to memory of 696 2020 d6d63be18cc68af69dbaddf66cb1d960N.exe 84 PID 2020 wrote to memory of 696 2020 d6d63be18cc68af69dbaddf66cb1d960N.exe 84 PID 2020 wrote to memory of 4212 2020 d6d63be18cc68af69dbaddf66cb1d960N.exe 85 PID 2020 wrote to memory of 4212 2020 d6d63be18cc68af69dbaddf66cb1d960N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6d63be18cc68af69dbaddf66cb1d960N.exe"C:\Users\Admin\AppData\Local\Temp\d6d63be18cc68af69dbaddf66cb1d960N.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:696
-
-
C:\Users\Admin\AppData\Local\Temp\_MofCompiler.exe"_MofCompiler.exe"2⤵
- Executes dropped EXE
PID:4212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD592bcc6a0f4c8179869fa0b4ec55d39da
SHA1563df1884f73ac8692754a044e6c1d9ac3a02ed2
SHA25615d765d5a1f845d208264764cb667c0f25c120b9d258a0091c8f3b9277be4522
SHA51218233427e2700bde610c8c11e84b2c9e4b07223a69054d3bb3621944f7e7d19c218170de210fefc48f9860a0d6291ecf3afc9a960fe9672b7a144d307d9a16d5
-
Filesize
21KB
MD50fe6e0e01318f2a27ece0176423ea4f8
SHA171cf6aaa4a88a2e892ce113fe35518441a58a97d
SHA25636217b7c4ac6aabc74a7f9d0d8da2002f5909d1d6dcb663c9cb1ec2c02a387b3
SHA51256be67fcf76f46a171c0ebcaa988e1e20cdba5fa91871e076b424b0b9bdd21219a19ca70c85314e5a79c1f878b7f68d7e51596b49536296e41ded5846158ac9b
-
Filesize
58KB
MD559448fb9af494fd550a9084414bef1e4
SHA18cf9a4d575e5ca391eb879fbca33676407173ab4
SHA256b8ecaa72714b0ab31396060d16bc5d62d2fd7f80ffb360ba27a225a24114bbe8
SHA51292d71d9120651b188af47471331e1e807b186509216ce2b58dc7f5a5cdb345c00087119aeaee56972b0479f081818aa35e641d3ed42af6cba0f9ee37ea5d250e