Analysis
-
max time kernel
119s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2024, 03:18
Behavioral task
behavioral1
Sample
5685c1c6f783c897c2083c5ea4910cf0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5685c1c6f783c897c2083c5ea4910cf0N.exe
Resource
win10v2004-20240802-en
General
-
Target
5685c1c6f783c897c2083c5ea4910cf0N.exe
-
Size
81KB
-
MD5
5685c1c6f783c897c2083c5ea4910cf0
-
SHA1
4f5ec600ff001a0fc033001b8c873c60b888eaa3
-
SHA256
721cecd314d49e7d132c0e8b093893f98a2e2257b96dc30c4bddba885ebd5ce4
-
SHA512
b50c81bdc411d164ba89a696f5602b90f0d74266b41622486e83573882ec88f6573162a9fe1f4066ad1e7ecab3573fa1b28a355cc8a4744ab6b76b07a624ea1c
-
SSDEEP
1536:CTW7JJB7LD2I2IHsLMkFUgCEHixUPig1juYo8:htD33HsygYxWHH
Malware Config
Signatures
-
Renames multiple (4678) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 244 Zombie.exe 3608 _createdump.exe -
resource yara_rule behavioral2/memory/3912-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x00090000000234b1-7.dat upx behavioral2/files/0x00070000000234cb-12.dat upx behavioral2/memory/3912-21-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe 5685c1c6f783c897c2083c5ea4910cf0N.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 5685c1c6f783c897c2083c5ea4910cf0N.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentR_Trial-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\StandardR_Retail-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\NL7MODELS000C.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription4-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\oledb32.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Runtime.Serialization.Formatters.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\System.Resources.Extensions.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\cryptix.md.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription4-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\PresentationCore.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\System.Windows.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial3-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProCO365R_SubTest-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_Grace-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\it\PresentationCore.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\images\cursors\invalid32x32.gif.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Retail-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Data.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\UIAutomationClient.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\libpng.md.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\offsymxb.ttf.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Runtime.Loader.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\it\System.Windows.Input.Manipulations.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\tr\System.Windows.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_Retail-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\vk_swiftshader_icd.json.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalPipcR_OEM_Perp-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.Excel.AnalysisServices.AdomdClientUI.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\deploy\messages_zh_TW.properties.tmp Zombie.exe File created C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-001F-040C-1000-0000000FF1CE.xml.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ru-ru.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\ado\msado21.tlb.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\fr-FR\sqloledb.rll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Security.SecureString.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Security.Cryptography.Cng.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\msoasb.exe.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\it-IT\oledb32r.dll.mui.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\deploy\messages_zh_CN.properties.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest5-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-process-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MEDIA\APPLAUSE.WAV.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Yellow.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\fre\StartMenu_Win7.wmv.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\hi.txt.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ja-jp.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\WindowsBase.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\it\System.Windows.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-core-profile-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\es\UIAutomationProvider.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\GKPowerPoint.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Redshift\lib\OpenSSL64.DllA\libeay32.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MSOARIANEXT.DLL.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Web.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\tr\System.Windows.Controls.Ribbon.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\tr\ReachFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Blue II.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\mscss7wre_fr.dub.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\de-DE\msdasqlr.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\Microsoft.DiaSymReader.Native.amd64.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\limited\US_export_policy.jar.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessVL_MAK-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProXC2RVL_MAKC2R-ul-oob.xrm-ms.tmp Zombie.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5685c1c6f783c897c2083c5ea4910cf0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3912 wrote to memory of 244 3912 5685c1c6f783c897c2083c5ea4910cf0N.exe 83 PID 3912 wrote to memory of 244 3912 5685c1c6f783c897c2083c5ea4910cf0N.exe 83 PID 3912 wrote to memory of 244 3912 5685c1c6f783c897c2083c5ea4910cf0N.exe 83 PID 3912 wrote to memory of 3608 3912 5685c1c6f783c897c2083c5ea4910cf0N.exe 84 PID 3912 wrote to memory of 3608 3912 5685c1c6f783c897c2083c5ea4910cf0N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\5685c1c6f783c897c2083c5ea4910cf0N.exe"C:\Users\Admin\AppData\Local\Temp\5685c1c6f783c897c2083c5ea4910cf0N.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:244
-
-
C:\Users\Admin\AppData\Local\Temp\_createdump.exe"_createdump.exe"2⤵
- Executes dropped EXE
PID:3608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD551b4cc88f1c2da72523d969b45c02f54
SHA1edb378722db2f8d68dd2d524d922e73268b90ef3
SHA256c2dd9d65827850f98298f2d93b24e0ff5fb7447a6c3cd4833b9c2e1a9d7a7e17
SHA512a21151d87cf9d2e0659e893d4c3f7693190d1cf43a18f7481d8ca34720810047bb2efa401a423a0ad904e312df8486e3d481a5105639275eab834c85353fbedf
-
Filesize
54KB
MD59ca726be24244f2cf7e2dec95b714c46
SHA1db976e979ec442e03799a26e861dc21847afe79a
SHA256a6324117d0f5b16d0ecaccd1497f471495e4b3d315f1df0da66758d0bbab18af
SHA5128e44e93e4cafba0cb6d3ad2d5f5935f5961cef0c841e534865f9f74f15f5d9007c6d304a597b97641d7cc001a1ef4675b4d19775ea7f4b9a778a882f3deeb449
-
Filesize
26KB
MD564939cce7a02ecce32e2508c128040ad
SHA10d1c621b63b2c039a0d9a8600fa5a3c89a0290d5
SHA2561279a8f39290072a9d186eb0e1c8772bcdfe6b6b1ce966603765628ddd1726fb
SHA512be0d2d41c8b4fc40d219f1339bfa4cf303560968273a391c87b561f1d1b2a95f8af2b747aabb0f6a73ba8404bb3d66853e4919290fc32028ac64adf227afe3e2