Analysis

  • max time kernel
    120s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/08/2024, 20:52

General

  • Target

    044916cb5912a4af99997ab93e9c4a90N.exe

  • Size

    485KB

  • MD5

    044916cb5912a4af99997ab93e9c4a90

  • SHA1

    d868476df6d8ac58281e66e7bd45d2870989405b

  • SHA256

    6e90ce9865b0268e368e4dbeb0b1b8d14c36096c65d3733b4d2b6b12ad5898b8

  • SHA512

    9588bc20098420cb33c6936b35a30446cae65fcc2ef2e995436716892300b44e258ddcdaed42fc2d4d33d3356f76bb0d0e41b56130f5dc4d4088c4101bb537dd

  • SSDEEP

    6144:eYrIOXsqmWzJrdc6GJRQUWGUA9PRWLiFSbE56FORF6:+2lWRPWhA9PRWg9q

Malware Config

Signatures

  • Renames multiple (4666) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\044916cb5912a4af99997ab93e9c4a90N.exe
    "C:\Users\Admin\AppData\Local\Temp\044916cb5912a4af99997ab93e9c4a90N.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:4548
    • C:\Users\Admin\AppData\Local\Temp\_setup.exe
      "_setup.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:5700

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-4182098368-2521458979-3782681353-1000\desktop.ini.tmp

          Filesize

          28KB

          MD5

          0566ea96e4a7b157b0b0ed6b796f0718

          SHA1

          0343d7d1365961c088fa38dc33c8cce754a218d6

          SHA256

          45f9e5661d32b8904792e1b9ecad5f1e573a84df3d03184c88bf37efb54afcfd

          SHA512

          e59cd6ee1b375c498a1637dd03db1d0961f41eb6e8b3a5c274be86173532df6a94faeb11018dec2e4951f76597addabd66295be94a018219a629bb76b50a91c5

        • C:\Users\Admin\AppData\Local\Temp\_setup.exe

          Filesize

          457KB

          MD5

          446366ca32877e2290d0bd8f22e11809

          SHA1

          b620d296d53566d9a07c1cabc92c50d0f5c4f34a

          SHA256

          4b76c0ea832d58966f824cfedb9a3831b1c286b13cc22d56e29dad7966847184

          SHA512

          edbb4cd70b9c372f827136db217087451732f83a34af854ff031a659e9aee0fe849c0005a38d2bd19f438f8277147101a577fa900b89e2e1f804b369134255cf

        • C:\Windows\SysWOW64\Zombie.exe

          Filesize

          28KB

          MD5

          7f11a9c186a2bad84ea9d082601472c1

          SHA1

          38fa0ff56f89bfc933116d5e48e5a0bea089eee9

          SHA256

          50f2396a9cd91c2a251b692ed073b5d208e61c90d6c754364c1ce9b2b0286bad

          SHA512

          78f2d0be3fdd54593b948a84c15f2a90858c30cbc361987bec312e04ffd494ff3868ce0be380534097290ad489933f1831f9fbb4a620be0f41021f015b55091c

        • memory/2948-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/4548-9-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB