Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 21:37
Static task
static1
Behavioral task
behavioral1
Sample
52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe
Resource
win10v2004-20240802-en
General
-
Target
52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe
-
Size
539KB
-
MD5
6a73584a7fe555203e71ac67472964cc
-
SHA1
dcbf316fe9bdbfa4b94c147785ec0e272ce7ff55
-
SHA256
52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd
-
SHA512
216b7efa47ae3caa9048ae149932b9b5aaf7fa288cffabb6789518ae457adcd5ac80032d56fc07caf3000dac18cfe67bdeb998665fc1a52f04cafb78fb1b41ef
-
SSDEEP
6144:RqKvb0CYJ973e+eBSo54oAnjyDdU1sL8Lsw9g09Bp0cV07nNoTWwan7:vvbxYXyS8y+mm8YwBm7fn7
Malware Config
Signatures
-
Renames multiple (3661) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 2172 Zombie.exe 1744 _MpCmdRun.exe -
Loads dropped DLL 2 IoCs
pid Process 300 52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe 300 52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe 52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\vlc.mo.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\demux\libsubtitle_plugin.dll.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\spu\librss_plugin.dll.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationRight_ButtonGraphic.png.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\it.pak.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.emf.ecore.xmi_2.10.1.v20140901-1043.jar.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-multiview_ja.jar.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-jvmstat.xml.tmp Zombie.exe File created C:\Program Files\Java\jre7\bin\jfr.dll.tmp Zombie.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\System.IdentityModel.Selectors.Resources.dll.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\vlc.mo.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_altgr.xml.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\mc.jar.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\America\Godthab.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\rings-dock.png.tmp Zombie.exe File created C:\Program Files\Windows Photo Viewer\en-US\PhotoAcq.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\zh-dayi.xml.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\specialoccasion.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.help_3.6.0.v20130326-1254.jar.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-coredump_ja.jar.tmp Zombie.exe File created C:\Program Files\Java\jre7\bin\j2pcsc.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\EST5EDT.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler-ui_ja.jar.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\libopus_plugin.dll.tmp Zombie.exe File created C:\Program Files\Internet Explorer\en-US\F12Tools.dll.mui.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Eucla.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\feature.properties.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\FlickLearningWizard.exe.mui.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\bundles.info.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\packetizer\libpacketizer_av1_plugin.dll.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\logo.png.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\ja-JP\msdaprsr.dll.mui.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Taipei.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-openide-util-enumerations.jar.tmp Zombie.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\System.Data.Entity.Resources.dll.tmp Zombie.exe File created C:\Program Files\Windows Journal\MSPVWCTL.DLL.tmp Zombie.exe File created C:\Program Files\Java\jre7\bin\javacpl.exe.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\Dhaka.tmp Zombie.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\it-IT\SpiderSolitaire.exe.mui.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\ku-ckb.txt.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwritash.dat.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\oledb32r.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe.tmp Zombie.exe File created C:\Program Files\Java\jre7\bin\java.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\Office14\VisioCustom.propdesc.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\libvlccore.dll.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\art\02_frenchtv.luac.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\RSSFeeds.html.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\settings.js.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\journal.dll.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\liba52_plugin.dll.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libchain_plugin.dll.tmp Zombie.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\zdingbat.txt.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\rtscom.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\ru.pak.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\include\jdwpTransport.h.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\sRGB.pf.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\notification_plugin.jar.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\HST.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-host-views.xml.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\America\Hermosillo.tmp Zombie.exe File created C:\Program Files\Windows Photo Viewer\en-US\PhotoViewer.dll.mui.tmp Zombie.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 300 wrote to memory of 2172 300 52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe 30 PID 300 wrote to memory of 2172 300 52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe 30 PID 300 wrote to memory of 2172 300 52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe 30 PID 300 wrote to memory of 2172 300 52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe"C:\Users\Admin\AppData\Local\Temp\52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2172
-
-
C:\Users\Admin\AppData\Local\Temp\_MpCmdRun.exe"_MpCmdRun.exe"2⤵
- Executes dropped EXE
PID:1744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD58188a5f2993a7753df4678918328e2d3
SHA1d8d544169011ca89fc4556ee8d889648c6032f09
SHA256cd74debe09950011a4b3c326f252d06f12d4e9f1f6893cedb44f64194a4e39fd
SHA5124250d64a6299e79443cc56dec9cec80e39e0d3cd887c8c9fa3d40b9c2fde7915df9fd04585030b8f667f6d38de9bec4b61e120140df8ccca7d3a279874a09de8
-
Filesize
453KB
MD5aa153bb98ec3f9e570624c51973ed8e3
SHA1670edf4eeac09a1e44d6fe3ee7ed242007d1dae8
SHA256b183a188f3d9e222da02cc8c222238ecae4b0b9280b2cf31fc82eb63a54c4106
SHA51277545f077c74fcc2f074a16a7becdad1e94b06822c0ab788abf936c5d73fc3202b0f2882fe08ccfe23ced9f70a9f49f2b0f23a023ada4c5e49b888f5d427e009
-
Filesize
85KB
MD50d7e41826fc9ca3854543db86a2d57ca
SHA1d03a1723748a1ee092cf09eebc1d1db254d5d540
SHA2562c915f47f055fc70088c508327f4228546eeedc2534ff732adbcd270849327c5
SHA51221bad97a9ff1203fc5da329e43dbc652edba59eaef8a371f9e3a019d79c3d45d3a4b8aeee761f9b8fb9249ae2f9fbf3ee13f0fe77204e0850ff9e0dfc6512694