Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 05:45
Static task
static1
Behavioral task
behavioral1
Sample
dc595fac0f1658220abac49fe974d78e9017c9176eadffe37562ecf82ea7c23d.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dc595fac0f1658220abac49fe974d78e9017c9176eadffe37562ecf82ea7c23d.exe
Resource
win10v2004-20240730-en
General
-
Target
dc595fac0f1658220abac49fe974d78e9017c9176eadffe37562ecf82ea7c23d.exe
-
Size
383KB
-
MD5
937ee5646f9f4d5dc09be21099f2e276
-
SHA1
a914781bca4c2941132274720b7a02d587d8c2d1
-
SHA256
dc595fac0f1658220abac49fe974d78e9017c9176eadffe37562ecf82ea7c23d
-
SHA512
0a425791d9dfb85b4877e6cff024e85de1d92fabb8cf8ecfa096ec51d348d33c020793b92231319f27ce9dcf89f286ae7443ed6967d8fc28f54f80060621aa71
-
SSDEEP
6144:PqFF2Ie+effypW+Dffz1gUZ3sOeNw0VqIJ/uJn9tvq3v3/sSQJw1Tn:iFF2UpW+Dfhg0cvd5JIDvTJw1L
Malware Config
Signatures
-
Renames multiple (5027) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 2316 Zombie.exe 4076 _7z.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe dc595fac0f1658220abac49fe974d78e9017c9176eadffe37562ecf82ea7c23d.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe dc595fac0f1658220abac49fe974d78e9017c9176eadffe37562ecf82ea7c23d.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ja\UIAutomationClientSideProviders.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pl\UIAutomationClient.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hant\UIAutomationTypes.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\LICENSE.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\LibCurl64.DllA\libcurl64.dlla.manifest.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.he-il.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\SharedPerformance.man.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.IO.Compression.Native.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoVL_MAK-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\msvcp120.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.IO.Compression.FileSystem.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.IO.Compression.Native.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.106\Locales\en-GB.pak.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\BORDERS\MSART6.BDR.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Client\api-ms-win-core-file-l2-1-0.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProVL_MAK-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\otkloadr_x64.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\deploy\messages_zh_TW.properties.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\legal\javafx\icu_web.md.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\tnameserv.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Blue II.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\TecProxy.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Net.Http.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pt-BR\PresentationFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\WindowsBase.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN081.XML.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2R64.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Resources.Writer.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\ext\cldrdata.jar.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pl\System.Xaml.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pt-BR\UIAutomationClient.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019DemoR_BypassTrial180-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp6-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.contrast-black_scale-80.png.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Client\msvcr120.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Retail-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusEDUR_SubTrial-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\PROOF\MSGR8FR.LEX.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pt-BR\System.Windows.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-crt-math-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\management\jmxremote.password.template.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\javaws.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp5-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\CHART.DLL.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\cs\System.Xaml.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\bin\idlj.exe.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\bin\jstatd.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Retail2-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp6-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdXC2RVL_KMS_ClientC2R-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\legal\jdk\zlib.md.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_Grace-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OutlookVL_MAK-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\IpsMigrationPlugin.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\it\PresentationFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.106\Locales\pl.pak.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\calendars.properties.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019XC2RVL_MAKC2R-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\icu.md.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\server\Xusage.txt.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp4-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MSOHTMED.EXE.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Dynamic.Runtime.dll.tmp Zombie.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc595fac0f1658220abac49fe974d78e9017c9176eadffe37562ecf82ea7c23d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _7z.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3688 wrote to memory of 2316 3688 dc595fac0f1658220abac49fe974d78e9017c9176eadffe37562ecf82ea7c23d.exe 83 PID 3688 wrote to memory of 2316 3688 dc595fac0f1658220abac49fe974d78e9017c9176eadffe37562ecf82ea7c23d.exe 83 PID 3688 wrote to memory of 2316 3688 dc595fac0f1658220abac49fe974d78e9017c9176eadffe37562ecf82ea7c23d.exe 83 PID 3688 wrote to memory of 4076 3688 dc595fac0f1658220abac49fe974d78e9017c9176eadffe37562ecf82ea7c23d.exe 85 PID 3688 wrote to memory of 4076 3688 dc595fac0f1658220abac49fe974d78e9017c9176eadffe37562ecf82ea7c23d.exe 85 PID 3688 wrote to memory of 4076 3688 dc595fac0f1658220abac49fe974d78e9017c9176eadffe37562ecf82ea7c23d.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc595fac0f1658220abac49fe974d78e9017c9176eadffe37562ecf82ea7c23d.exe"C:\Users\Admin\AppData\Local\Temp\dc595fac0f1658220abac49fe974d78e9017c9176eadffe37562ecf82ea7c23d.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2316
-
-
C:\Users\Admin\AppData\Local\Temp\_7z.exe"_7z.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD576943e34e193140984cad7903199167e
SHA1d046f92ebfe2564082e1eae1062f4bf0f9c2a8ea
SHA25606324943b885b5a3b69c615e153501f8693af93d8f94bab7995086d4ce851188
SHA5127170ca27fea30179cf39a30d619227138f2e9fd2effc0170207c6b6fb672fc2a63e9cd25a87ce7712b147efa6ab687a298bc25993fb1e4e97884e74707a646d7
-
Filesize
284KB
MD5a42b35f975d88c1370a7aff084ee57a7
SHA1bee1408fe0b15f6f719f003e46aee5ec424cf608
SHA25656cc9e7e3767c0cffae8161bf0ad13457487c1b422e2879b897dbd4bab115776
SHA512b92d05515e18277db660118934e70678ee2a3bb66005bad19bb417ffaedb22a63727a5a697ca3ac0f6c48f6f5593ba45ab80f4ebdc0eaed10d80b7af04d45b23
-
Filesize
99KB
MD55fa2f6d65d5512be57f380cc53582482
SHA1db3f50b0d4d52b7982067e38f648fe3f3b76603c
SHA256eb4adad2d8b0787ac71f1fea8851e2cce97adde0d254e312fcbdd2151a7e0acb
SHA512e42720eeb882ca1633491535a316c7642581f97f42ae4df92b7b9786ca33e1c5a17d0fb4de4a7ae9e5d99b5575cc092e5076a54c6f8a34709f6beab64160acf6