Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 05:19

General

  • Target

    7fc15bd51b85abb4d6cf65fae8a85710N.exe

  • Size

    85KB

  • MD5

    7fc15bd51b85abb4d6cf65fae8a85710

  • SHA1

    c318e4a94419229d0e706f28494ea8c11894ece8

  • SHA256

    2a758d73e21dac515d3a96ccfb3fa3f2e6e4c8aeb129b1567ef04407eb1512c5

  • SHA512

    7906285d8c95f465950fa0dbd56c9241e0ff0b0963d587fe40efbcf5f54782a37afbcc9e6b755ebc1116b9e6b17a94fb274c5b4a97e0575e6ee40a815c6b7201

  • SSDEEP

    768:W7BlpppARFbhknrzzA8JQ2AdJCzA8JQ2AdJcUYU77BlpppARFbhknrzzA8JQ2AdC:W7ZppApkxUYU77ZppApkxUYUtYUA

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7fc15bd51b85abb4d6cf65fae8a85710N.exe
    "C:\Users\Admin\AppData\Local\Temp\7fc15bd51b85abb4d6cf65fae8a85710N.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:4864
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      PID:5092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Zombie.exe

    Filesize

    44KB

    MD5

    3454b56c1c21ea41cc3c46825e1e3153

    SHA1

    41d59453199eac6f8bc3e72e70056f22a096b719

    SHA256

    f35ab09fabec52f60761dc4a79aa89734895b7ffdc39c949ed9192989aa6fabb

    SHA512

    2623bc5dbeee67ec8443053054d0028b3122ebf12d607227a4f62a7ac147eef41a16a2e80ae5aa407e2e4ab8b108be584a88bc6bee269b498abc6e775b0243c5