Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 21:37
Static task
static1
Behavioral task
behavioral1
Sample
52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe
Resource
win10v2004-20240802-en
General
-
Target
52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe
-
Size
539KB
-
MD5
6a73584a7fe555203e71ac67472964cc
-
SHA1
dcbf316fe9bdbfa4b94c147785ec0e272ce7ff55
-
SHA256
52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd
-
SHA512
216b7efa47ae3caa9048ae149932b9b5aaf7fa288cffabb6789518ae457adcd5ac80032d56fc07caf3000dac18cfe67bdeb998665fc1a52f04cafb78fb1b41ef
-
SSDEEP
6144:RqKvb0CYJ973e+eBSo54oAnjyDdU1sL8Lsw9g09Bp0cV07nNoTWwan7:vvbxYXyS8y+mm8YwBm7fn7
Malware Config
Signatures
-
Renames multiple (5036) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 3660 Zombie.exe 2964 _MpCmdRun.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe 52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Collections.Immutable.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\java.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription5-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\ClientPreview_eula.txt.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\EduWorks Data Streamer Add-In\MicrosoftDataStreamerforExcel.vsto.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\Configuration\config.xml.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Runtime.InteropServices.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\WindowsFormsIntegration.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-core-util-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentVNextR_Grace-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\WordR_Retail-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MSOARIA.DLL.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pt-BR\Microsoft.VisualBasic.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\ssv.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessPipcR_OEM_Perp-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\PROTOCOLHANDLERINTL.DLL.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\zh-CN\msipc.dll.mui.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogoSmall.scale-140.png.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\cs\System.Windows.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\it\UIAutomationClientSideProviders.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-localization-l1-2-0.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\sspi_bridge.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Standard2019VL_MAK_AE-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.IO.Pipes.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ru\PresentationCore.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_Retail-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Text.Encoding.Extensions.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.Windows.Forms.Primitives.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\msoetwres.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-utility-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\ado\msadox.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Runtime.Intrinsics.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MEDIA\CHIMES.WAV.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN121.XML.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.contrast-white_scale-80.png.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll.sig.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPointR_Trial-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_Retail-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\BORDERS\MSART7.BDR.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.contrast-black_scale-180.png.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\io.txt.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\ku.txt.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\coreclr.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-file-l1-2-0.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoVL_KMS_Client-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019VL_MAK_AE-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\IFDPINTL.DLL.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\cs\PresentationCore.resources.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdCO365R_Subscription-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\TipTsf.dll.mui.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\fa.pak.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription3-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Internet Explorer\de-DE\ieinstal.exe.mui.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\jpeg.md.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.scale-100.png.tmp Zombie.exe File created C:\Program Files\dotnet\swidtag\Microsoft Windows Desktop Runtime - 8.0.2 (x64).swidtag.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\it.pak.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019R_OEM_Perp-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Text.Encoding.Extensions.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Net.WebProxy.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ja\PresentationFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\legal\javafx\webkit.md.tmp Zombie.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4464 wrote to memory of 3660 4464 52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe 84 PID 4464 wrote to memory of 3660 4464 52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe 84 PID 4464 wrote to memory of 3660 4464 52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe 84 PID 4464 wrote to memory of 2964 4464 52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe 85 PID 4464 wrote to memory of 2964 4464 52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe"C:\Users\Admin\AppData\Local\Temp\52bd311d6e5381c07066678acc8150edbc63c6a697cb94e91e944a12766710dd.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3660
-
-
C:\Users\Admin\AppData\Local\Temp\_MpCmdRun.exe"_MpCmdRun.exe"2⤵
- Executes dropped EXE
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD5157fedd1bca72dcd9e8b741dcf868baf
SHA1ccf564227b2bc464654c1b1ee04d4d0d623b7769
SHA256ef948e0b1356646e709d45c064b82cf7a24ad245e0f564dc6c0e9c9b454d397b
SHA512e331c999dc75f851de4b8166fd21a48b2e4e751f32875cef99068e36f3ede31fa4e568b714ccfb0bd625f28b18cf9e52ba6faccf29ee7ce7eb3635060abd9e58
-
Filesize
453KB
MD5aa153bb98ec3f9e570624c51973ed8e3
SHA1670edf4eeac09a1e44d6fe3ee7ed242007d1dae8
SHA256b183a188f3d9e222da02cc8c222238ecae4b0b9280b2cf31fc82eb63a54c4106
SHA51277545f077c74fcc2f074a16a7becdad1e94b06822c0ab788abf936c5d73fc3202b0f2882fe08ccfe23ced9f70a9f49f2b0f23a023ada4c5e49b888f5d427e009
-
Filesize
85KB
MD50d7e41826fc9ca3854543db86a2d57ca
SHA1d03a1723748a1ee092cf09eebc1d1db254d5d540
SHA2562c915f47f055fc70088c508327f4228546eeedc2534ff732adbcd270849327c5
SHA51221bad97a9ff1203fc5da329e43dbc652edba59eaef8a371f9e3a019d79c3d45d3a4b8aeee761f9b8fb9249ae2f9fbf3ee13f0fe77204e0850ff9e0dfc6512694