Analysis

  • max time kernel
    120s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/07/2024, 00:12

General

  • Target

    1fd08a255f99a0dcbb87f4b7cae40020N.exe

  • Size

    184KB

  • MD5

    1fd08a255f99a0dcbb87f4b7cae40020

  • SHA1

    2ad9e9c8c37e18163d120493be7bad218a77ace6

  • SHA256

    327acee27ed43cd45667d5a49fbf86b4281e4ff499fb8617fe12b54b24fdeaba

  • SHA512

    5a7635076385f86abb6d0c97c48b2b225b07069e36dab5e9296f5aaf6508772a38be5f40564023651105f1a5ed2eabe64c02a892f95e81e8542e5e2559e72969

  • SSDEEP

    3072:6NLWpCZLYwWTSIoXkZA/gwjHnrhtVufJO05m4uvHwog8yT5FoC:u6SYwWTSIoXNHnr1GJOl4uvjgddFB

Score
9/10

Malware Config

Signatures

  • Renames multiple (4026) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1fd08a255f99a0dcbb87f4b7cae40020N.exe
    "C:\Users\Admin\AppData\Local\Temp\1fd08a255f99a0dcbb87f4b7cae40020N.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1892
    • C:\Users\Admin\AppData\Local\Temp\_dotnet.exe
      "_dotnet.exe"
      2⤵
      • Executes dropped EXE
      PID:4636
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1750093773-264148664-1320403265-1000\desktop.ini.exe

    Filesize

    51KB

    MD5

    d52d5ffa1e79127bd4f98bd9534ab096

    SHA1

    99b2e63f6835be60100b48b869c18aad0a092417

    SHA256

    c0ab83a5303e92cf1d68dc2b44f7c86c39c14d211600c52d2be5a3c44ea8c9e8

    SHA512

    88e9280e5ea70fbc1d9b1bac92cfd917037809ca5bfc2517a075dc0a5cc4cadd3226473d1a145363808e2fa6f1e660e0f3ac77de1ae32d6f15855423c3dddf5e

  • C:\Users\Admin\AppData\Local\Temp\_dotnet.exe

    Filesize

    133KB

    MD5

    bd2e0226c5d444555a233930906e5779

    SHA1

    ed7b36f8a6802008bba17b70c7c6beb873ca68b6

    SHA256

    a8cd8b9bd4e4b99c7d6e509d1b4fefae7bc15c1e42a218e09ddfd4a924b3da9f

    SHA512

    d2cdb8f7a384bdb8cfb82e67da27d05ba30206542bf54d815b71b8ba1ef43ebd8cdef3ed7a2debeccd397aeeb7196b29af966d7ea9cbb41acadaafb854e00971

  • C:\Windows\SysWOW64\Zombie.exe

    Filesize

    50KB

    MD5

    7456257542437aa450ea741473e92e79

    SHA1

    1ecf31c4bca60b42dc2744f928d780c226fd3002

    SHA256

    673e837710838e88bcc4f807b6fff7cc48156be58f64226fafeabc702c9f9d30

    SHA512

    5041071a69de03b7a3c03eccf2e85a89859806ad6564ce7ab0ff93b86ede132dc44179a6c7bbae7d13b9f57ac3d5c5c733a26571ccd8532df1bf3b15fc91033c