Analysis

  • max time kernel
    120s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/07/2024, 14:05

General

  • Target

    d6d63be18cc68af69dbaddf66cb1d960N.exe

  • Size

    81KB

  • MD5

    d6d63be18cc68af69dbaddf66cb1d960

  • SHA1

    396e34ab8e05779dc31c63ebac89c498a1de0985

  • SHA256

    a90489de733f79dcd0f39fd14d37aeaef37b11ca40a5752e3a48239c684a933d

  • SHA512

    10e29001b84595c3916949680a3e80716399c4b284a6b2c2390dc1d5dab8cb0c0a96677b6b8fa7fe8207cc2c3bab0b7d527be23550ac734f4551bb523bd8569c

  • SSDEEP

    1536:W7ZhA7pApvOsOKjv46Ov46MbRsjaVZP7iNpW0/137qSez/P:6e7WpPRsjacpW0/5ZebP

Score
9/10

Malware Config

Signatures

  • Renames multiple (4653) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d6d63be18cc68af69dbaddf66cb1d960N.exe
    "C:\Users\Admin\AppData\Local\Temp\d6d63be18cc68af69dbaddf66cb1d960N.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:696
    • C:\Users\Admin\AppData\Local\Temp\_MofCompiler.exe
      "_MofCompiler.exe"
      2⤵
      • Executes dropped EXE
      PID:4212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-384068567-2943195810-3631207890-1000\desktop.ini.tmp

    Filesize

    59KB

    MD5

    92bcc6a0f4c8179869fa0b4ec55d39da

    SHA1

    563df1884f73ac8692754a044e6c1d9ac3a02ed2

    SHA256

    15d765d5a1f845d208264764cb667c0f25c120b9d258a0091c8f3b9277be4522

    SHA512

    18233427e2700bde610c8c11e84b2c9e4b07223a69054d3bb3621944f7e7d19c218170de210fefc48f9860a0d6291ecf3afc9a960fe9672b7a144d307d9a16d5

  • C:\Users\Admin\AppData\Local\Temp\_MofCompiler.exe

    Filesize

    21KB

    MD5

    0fe6e0e01318f2a27ece0176423ea4f8

    SHA1

    71cf6aaa4a88a2e892ce113fe35518441a58a97d

    SHA256

    36217b7c4ac6aabc74a7f9d0d8da2002f5909d1d6dcb663c9cb1ec2c02a387b3

    SHA512

    56be67fcf76f46a171c0ebcaa988e1e20cdba5fa91871e076b424b0b9bdd21219a19ca70c85314e5a79c1f878b7f68d7e51596b49536296e41ded5846158ac9b

  • C:\Windows\SysWOW64\Zombie.exe

    Filesize

    58KB

    MD5

    59448fb9af494fd550a9084414bef1e4

    SHA1

    8cf9a4d575e5ca391eb879fbca33676407173ab4

    SHA256

    b8ecaa72714b0ab31396060d16bc5d62d2fd7f80ffb360ba27a225a24114bbe8

    SHA512

    92d71d9120651b188af47471331e1e807b186509216ce2b58dc7f5a5cdb345c00087119aeaee56972b0479f081818aa35e641d3ed42af6cba0f9ee37ea5d250e

  • memory/4212-14-0x00000200AC000000-0x00000200AC00A000-memory.dmp

    Filesize

    40KB

  • memory/4212-11-0x00007FFE23A63000-0x00007FFE23A65000-memory.dmp

    Filesize

    8KB