Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 03:12
Static task
static1
Behavioral task
behavioral1
Sample
4758ecb9c5aac5de1be72f3a0cf87bf0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4758ecb9c5aac5de1be72f3a0cf87bf0N.exe
Resource
win10v2004-20240730-en
General
-
Target
4758ecb9c5aac5de1be72f3a0cf87bf0N.exe
-
Size
193KB
-
MD5
4758ecb9c5aac5de1be72f3a0cf87bf0
-
SHA1
3451c2dc6cb9bc9233f021461b409824cb2d6976
-
SHA256
584f59f339694e4423ef8ab1cff4d993a59f6ebdcdbb0548bc02eb8fee503e65
-
SHA512
2b93ed304134281e2d33902d1a32a52c207c93802b0719c15499e43ec021c384a5809ea603c1a00454dadaac0b15c5ae84cab57cf47a32f0ca448442c6566c92
-
SSDEEP
3072:6e7WpvR9vHpKmEGCLOwstyhZFChcssc56FUrgxvbSD4UQrO2ixMl:RqH9/pKvShcHUax
Malware Config
Signatures
-
Renames multiple (4618) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 3956 Zombie.exe 4508 _cup.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe 4758ecb9c5aac5de1be72f3a0cf87bf0N.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 4758ecb9c5aac5de1be72f3a0cf87bf0N.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\gl\msipc.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\en-US\msdaremr.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.Pipes.AccessControl.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hans\ReachFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\bin\java.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Spatial.NetFX35.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Standard2019R_Retail-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdR_Retail-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.contrast-black_scale-140.png.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-processthreads-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-timezone-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-crt-private-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\System.Windows.Controls.Ribbon.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\legal\javafx\icu_web.md.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\fr\WindowsBase.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdVL_MAK-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\sl\msipc.dll.mui.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_Retail-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\rtscom.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Buffers.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\Microsoft.NETCore.App.deps.json.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\jfr\default.jfc.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\images\cursors\win32_LinkDrop32x32.gif.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Orange Red.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\client-issuance-bridge-office.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentR_Grace-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365BusinessDemoR_BypassTrial365-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp6-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdO365R_SubTrial-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-locale-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hans\PresentationCore.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pt-BR\PresentationUI.resources.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.106\Locales\gu.pak.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.106\Locales\kn.pak.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\IEContentService.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.contrast-black_scale-180.png.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\bin\javap.exe.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\fontconfig.properties.src.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_Retail-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\GRAPH.HXS.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusEDUR_SubTrial-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PersonalR_Retail-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PublisherR_OEM_Perp-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\ar.txt.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Net.NameResolution.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ru\UIAutomationTypes.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\javaws.jar.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\legal\jdk\giflib.md.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\BORDERS\MSART8.BDR.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\ea-sym.xml.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-core-heap-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019XC2RVL_MAKC2R-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\verify.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\lcms.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Integration\C2RManifest.dcfmui.msi.16.en-us.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\XLMACRO.CHM.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Standard2019R_Trial-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019R_OEM_Perp-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\System.Windows.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\tr\System.Windows.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hant\System.Windows.Forms.Design.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp4-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_O16ConsumerPerp_Bypass30-ppd.xrm-ms.tmp Zombie.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4758ecb9c5aac5de1be72f3a0cf87bf0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4480 wrote to memory of 3956 4480 4758ecb9c5aac5de1be72f3a0cf87bf0N.exe 84 PID 4480 wrote to memory of 3956 4480 4758ecb9c5aac5de1be72f3a0cf87bf0N.exe 84 PID 4480 wrote to memory of 3956 4480 4758ecb9c5aac5de1be72f3a0cf87bf0N.exe 84 PID 4480 wrote to memory of 4508 4480 4758ecb9c5aac5de1be72f3a0cf87bf0N.exe 83 PID 4480 wrote to memory of 4508 4480 4758ecb9c5aac5de1be72f3a0cf87bf0N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\4758ecb9c5aac5de1be72f3a0cf87bf0N.exe"C:\Users\Admin\AppData\Local\Temp\4758ecb9c5aac5de1be72f3a0cf87bf0N.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\_cup.exe"_cup.exe"2⤵
- Executes dropped EXE
PID:4508
-
-
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD55f488e8b5b797b3e27a610a81110c1a2
SHA1568e6cd7e2a934164cb5b9e7472d8f7b57ac334a
SHA25639e97aeae89a794a9bbe2c330cede8f1450f77f4c4c5ef58a5bf3d9eb723b242
SHA512f2f374ef5d2b6f705d76ecbeb11a9dea0b2e721af005a281c93e15beacec47f2d9918d29fe7be1e49e42c410d06cca97880bf264400dc9402f09b69c8926c633
-
Filesize
143KB
MD538f108cddb6619fba80f8382d5227ece
SHA112fd277bf756f22cfae3043900e4aff8b9f05ed9
SHA2568296fe257b8c34398e3f291764454ec3cd9cbe06d60989b632ef4ba6c73ae5dc
SHA5123db732c23f10122c78cffc6b6a5b11836ade1a23f5c6f9a192f2be2fa99c5bd7afb7a9e29c5d518a888cdd2091f9ac41b244214be226152830e96f5ec2cca424
-
Filesize
49KB
MD557878399cc044912af7231f7cc2375cb
SHA1e146c9fedad527380d2fbe15b605dad66a611a9e
SHA25644ca47ec630156ed781298c2c0129ce3dc987a08fc633aaa2097a7dfc325151d
SHA5121c27bcadfbc7259acae1e5d5affb46fb48bd12391cb7c11ad6d4a104d5375ace55440a0c2ff31de7130b18babf76834d917a1bce48332d3e86612ec81ba17be6