Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 21:53

General

  • Target

    09acccd0e668607fe54edf642b207470N.exe

  • Size

    179KB

  • MD5

    09acccd0e668607fe54edf642b207470

  • SHA1

    97895dd07080a39bfeb0a17ddba44a3db65a91ac

  • SHA256

    0ec2034abaaccd450bf7aaead5f63c896a323fb9241afbfbb143b2acfa6a816d

  • SHA512

    3cd57721fc67df537237fa09d4ba79596e79f3b0b216f282c1d8983757cb9faeef6420833910f0fd87770c139b623268a220cc04f73ac83ed33ce6bbc0c8dd26

  • SSDEEP

    3072:9QWp+S791HpKIqGCLOwstyhZFChcssc56FUrgxvbSD4UQrO23xe:LkO9xpKbShcHUa4

Score
9/10

Malware Config

Signatures

  • Renames multiple (3290) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09acccd0e668607fe54edf642b207470N.exe
    "C:\Users\Admin\AppData\Local\Temp\09acccd0e668607fe54edf642b207470N.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2628
    • C:\Users\Admin\AppData\Local\Temp\_cuninst.exe
      "_cuninst.exe"
      2⤵
      • Executes dropped EXE
      PID:3068
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:1140

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

          Filesize

          36KB

          MD5

          420021bed8caa24bdde00862af0d7bf5

          SHA1

          ab7acb68f23ab8c920461e2d51dbe6dbb3237080

          SHA256

          fa7ca35998d4024383a3cadb8aff747e8643c3a7804d833acdddd8db91d5bfcc

          SHA512

          6872f734d35864f1a6cc1346d42a3f0f09ff25a3388125b58be2b0353ff3d74af04d086a29b346e12a9da3f00b694bb41aefc0fdfafd2184651ce4ffb37e65fa

        • \Users\Admin\AppData\Local\Temp\_cuninst.exe

          Filesize

          143KB

          MD5

          7f9f981d970cbccece6ff126ab309045

          SHA1

          950a14dc6b636237c2f158cce02076b1a1b371e0

          SHA256

          82596d7d86d685087965457c297973c2aa1fbff0f6a0a3b8d8760f1cc65105cf

          SHA512

          ac59a2c6bc3b6fad47bac83d84336387b03b45d186c5d021f3c57c7fb160491e8344923d4978e50fb37f6c37e45bbb9c0f9b7cd4b93506ff571c82b795c6fb47

        • \Windows\SysWOW64\Zombie.exe

          Filesize

          35KB

          MD5

          bf01a06b55bc8063c8b63bb718faef72

          SHA1

          c4d5a4e311215dba95712d882f5292b46012e493

          SHA256

          df90b3b121988367f5d793d7fa1a75c0e1624e7eaf9a8806f7a7c5ae40712a85

          SHA512

          a0a93fdde4f61e32812a428dd6c02f41d44428d02736c382656d504bdf644c7dae7022ccb0cde403d7eb7424579797495780c2b5e487f7a3c01c2d7ed39ef7f2

        • memory/1140-17-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2628-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2628-10-0x0000000000360000-0x0000000000368000-memory.dmp

          Filesize

          32KB

        • memory/2628-15-0x0000000000360000-0x0000000000368000-memory.dmp

          Filesize

          32KB

        • memory/3068-23-0x000007FEF5923000-0x000007FEF5924000-memory.dmp

          Filesize

          4KB

        • memory/3068-24-0x0000000000E60000-0x0000000000E88000-memory.dmp

          Filesize

          160KB