Analysis
-
max time kernel
150s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 05:31
Static task
static1
Behavioral task
behavioral1
Sample
d67b69a0bf734abe727ee7230ebbf11963fb1dbfb735b3c6a8999c96a3ae4816.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d67b69a0bf734abe727ee7230ebbf11963fb1dbfb735b3c6a8999c96a3ae4816.exe
Resource
win10v2004-20240730-en
General
-
Target
d67b69a0bf734abe727ee7230ebbf11963fb1dbfb735b3c6a8999c96a3ae4816.exe
-
Size
486KB
-
MD5
7e912cdb25fb72e44c27eee361e27297
-
SHA1
c83e37b1516d42cdc7ea9299d1dd497efad86eac
-
SHA256
d67b69a0bf734abe727ee7230ebbf11963fb1dbfb735b3c6a8999c96a3ae4816
-
SHA512
2341f31e622c6e2677424e6411f2b5ce9f1c7cd4a2a51262b864ccdbd143cfae712872f9c2951ba88d644eda14fe067a1df5ba3da2953f5666b2675ca7d64708
-
SSDEEP
12288:Z0md3/94A2p8GnqZycIr+VtKzvFWOC3aEX92:Zx/WnSyhbzv8O0w
Malware Config
Signatures
-
Renames multiple (5172) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 3 IoCs
pid Process 4880 Zombie.exe 3792 _vcredist_x86.exe 2204 _vcredist_x86.exe -
Loads dropped DLL 1 IoCs
pid Process 2204 _vcredist_x86.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe d67b69a0bf734abe727ee7230ebbf11963fb1dbfb735b3c6a8999c96a3ae4816.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe d67b69a0bf734abe727ee7230ebbf11963fb1dbfb735b3c6a8999c96a3ae4816.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Runtime.CompilerServices.Unsafe.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Text.Encodings.Web.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\jfr\profile.jfc.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProO365R_SubTrial-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Diagnostics.StackTrace.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\it\System.Xaml.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\AccessR_Trial-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\ClientARMRefer2019_eula.txt.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\PPINTL.DLL.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\excel.exe.manifest.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_OEM_Perp-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.PPT.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\WordR_Trial-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\MSOUC_COL.HXT.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\VVIEWRES.DLL.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\ja-JP\msdaprsr.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\fr\System.Windows.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\jabswitch.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp2-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\BORDERS\MSART3.BDR.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\rsod\wordmui.msi.16.en-us.tree.dat.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hant\System.Xaml.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\meta-index.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power View Excel Add-in\BI-Report.png.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365EduCloudEDUR_SubTrial-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial2-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\WordR_Retail-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL090.XML.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\rsod\onenotemui.msi.16.en-us.boot.tree.dat.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\legal\javafx\libxslt.md.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial4-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPointR_Retail-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Spatial.NetFX35.V7.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\AugLoop\third-party-notices.txt.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ja\PresentationCore.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\bin\jhat.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_OEM_Perp-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PublisherR_Retail-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\PresentationFramework.Classic.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\ext\cldrdata.jar.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Subscription-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\no\msipc.dll.mui.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ONBttnIELinkedNotes.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\tr\UIAutomationClientSideProviders.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\jfr.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPointVL_MAK-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\Bibliography\Style\GostName.XSL.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MEDIA\CHIMES.WAV.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\vccorlib140.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ja\System.Windows.Controls.Ribbon.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019VL_KMS_Client_AE-ul.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\he\msipc.dll.mui.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\SignalRClient.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\System.Windows.Input.Manipulations.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Integration\C2RManifest.Word.Word.x-none.msi.16.x-none.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusDemoR_BypassTrial365-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProVL_MAK-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MML2OMML.XSL.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\adcvbs.inc.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.106\Locales\fil.pak.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019R_Retail-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-ES\TipTsf.dll.mui.tmp Zombie.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d67b69a0bf734abe727ee7230ebbf11963fb1dbfb735b3c6a8999c96a3ae4816.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vcredist_x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _vcredist_x86.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4708 wrote to memory of 4880 4708 d67b69a0bf734abe727ee7230ebbf11963fb1dbfb735b3c6a8999c96a3ae4816.exe 83 PID 4708 wrote to memory of 4880 4708 d67b69a0bf734abe727ee7230ebbf11963fb1dbfb735b3c6a8999c96a3ae4816.exe 83 PID 4708 wrote to memory of 4880 4708 d67b69a0bf734abe727ee7230ebbf11963fb1dbfb735b3c6a8999c96a3ae4816.exe 83 PID 4708 wrote to memory of 3792 4708 d67b69a0bf734abe727ee7230ebbf11963fb1dbfb735b3c6a8999c96a3ae4816.exe 84 PID 4708 wrote to memory of 3792 4708 d67b69a0bf734abe727ee7230ebbf11963fb1dbfb735b3c6a8999c96a3ae4816.exe 84 PID 4708 wrote to memory of 3792 4708 d67b69a0bf734abe727ee7230ebbf11963fb1dbfb735b3c6a8999c96a3ae4816.exe 84 PID 3792 wrote to memory of 2204 3792 _vcredist_x86.exe 85 PID 3792 wrote to memory of 2204 3792 _vcredist_x86.exe 85 PID 3792 wrote to memory of 2204 3792 _vcredist_x86.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\d67b69a0bf734abe727ee7230ebbf11963fb1dbfb735b3c6a8999c96a3ae4816.exe"C:\Users\Admin\AppData\Local\Temp\d67b69a0bf734abe727ee7230ebbf11963fb1dbfb735b3c6a8999c96a3ae4816.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4880
-
-
C:\Users\Admin\AppData\Local\Temp\_vcredist_x86.exe"_vcredist_x86.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\_vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\_vcredist_x86.exe" -burn.unelevated BurnPipe.{F3317EB4-F74C-4CD2-9ED9-492B063821F7} {07038652-E07F-4791-B159-C74C1B44A3A1} 37923⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2204
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD59a684b88e9e08b5afc88ea9a9e8bf7eb
SHA1641ad152e3889e0300836e933da7200ff803ce08
SHA256be69e8a2d83a9a239570498d645937d54cba34fb06cdb763ec9604d9bbf71bd7
SHA512d66176a264f1caa7ef72cf11f39fd2114dbb26c18513ca3057e92956079d7bd21dfc3176f39448dcbbe39e2aaeb7dac80f5082f24bd2d681e1df01bc811d42ca
-
Filesize
443KB
MD539e2f79a5becdc5ffdf17003402c2f82
SHA17d2c053093cedf3e4b556628b3d8192275b983a8
SHA25676583dd73769247f3ee4b1a74dfca1dd9792c74aaa246c324f97201c34ed1a5a
SHA5122f4fba7ec629275f0cc64587d885ca9c1d8b5fb6e968b98b7307be93d6cf02a56871b8cc04990a3939ccb5b5840cf55b6a2f5093b3ee0c4d4cc72a996e6d343b
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
126KB
MD5d7bf29763354eda154aad637017b5483
SHA1dfa7d296bfeecde738ef4708aaabfebec6bc1e48
SHA2567f5f8fcfd84132579f07e395e65b44e1b031fe01a299bce0e3dd590131c5cb93
SHA5121c76175732fe68b9b12cb46077daa21e086041adbd65401717a9a1b5f3c516e03c35a90897c22c7281647d6af4a1a5ffb3fbd5706ea376d8f6e574d27396019c
-
Filesize
42KB
MD561e790b0ac1d69d204f95a40f2f8e2b6
SHA165bcef81df0547bb1420a1beef725f1767b5f3bd
SHA256aa3617d45cb9858fbf90b82550121bd85fd0d416b035f71471a5aa68e77e9703
SHA512cb3b9c3f0f1a6c292582c58228cbf8bff634d33258acfc926ae609e5f1f552b4b325c32ce57fcf3936eabd656c4ead21d57b879ba317df4e48c7c91e2915100f