Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    12-08-2024 02:31

General

  • Target

    cff8ab1dfa13e7bef413d2578502cf466d75f05c5a73bab7bfb634470dba57ea.exe

  • Size

    83KB

  • MD5

    1319481afa3f52271810a1ace6fc7e2d

  • SHA1

    93a31ba7fe4668bdd248d5d9c2deedf72958fdd0

  • SHA256

    cff8ab1dfa13e7bef413d2578502cf466d75f05c5a73bab7bfb634470dba57ea

  • SHA512

    9d052f2c64aa1efe07763ecfa055c8d8eec9641d0938fce95a79f2bf53e33a6f8bcb23365a4f59cfbd11e3a7a45ae305a08515e180565d74bc70d7db1c31ad80

  • SSDEEP

    1536:W7ZhA7pApM21LOA1LO2c6b25gc6b25uCrbpSvr5xpYr0ARZF6NFVogjQlRv/L6:6e7WpMgLOiLO2c6b25gc6b25uwUhQ7X+

Score
9/10

Malware Config

Signatures

  • Renames multiple (3753) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cff8ab1dfa13e7bef413d2578502cf466d75f05c5a73bab7bfb634470dba57ea.exe
    "C:\Users\Admin\AppData\Local\Temp\cff8ab1dfa13e7bef413d2578502cf466d75f05c5a73bab7bfb634470dba57ea.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Users\Admin\AppData\Local\Temp\_checksum.exe
      "_checksum.exe"
      2⤵
      • Executes dropped EXE
      PID:2384
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:1896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    5dbd31eea364bbd1226a16fc3a9d768b

    SHA1

    4e1e5e44f3651365e60ba8817cb577e8b66fb453

    SHA256

    b01e030be7fdc72a5ae0bf7e0f1c3d77cef4682f90408ed584d228b766bfa9f0

    SHA512

    9b0dcb2cb17f87143c0595c8f415b16f2e1a58fb98dfd50ef64e4772930bc2783bc351040319a054142f4674384c9fde18e152cf72a808a169643acff3fd0ca7

  • \Users\Admin\AppData\Local\Temp\_checksum.exe

    Filesize

    35KB

    MD5

    23f049f14ca0e68af4b9883514791dfe

    SHA1

    1224ecfda221e54d4536a4ac102a56235320ee25

    SHA256

    9562aabe1f71d7ff5ec879fd2fb5cfe4be2c8f62a7fa5a1aa49660c3a495f1fb

    SHA512

    ce91cd089a299ba88f047cf15fd06673389942dabbf8be5bf2e2666e1048bc6da261ce30cae1e2ecb3b50392441a335bf97cc4ed51540554bedabe65590be677

  • \Windows\SysWOW64\Zombie.exe

    Filesize

    47KB

    MD5

    07eb1d1f5a0529b62a8d20202adf1fa6

    SHA1

    5cd62b14600234c4d3b2b9e182684a9512b1dcca

    SHA256

    af173d1a09b37de8f1d3fe3976c30d8f26cbf58cc20dae6a14f7b5b77f8fd212

    SHA512

    5402a62896f7971faa59ccc4d9e13cbdf64e58d67e1774318c676de661e65c1dd44ff5e123ee89098899122d501c42f9b9b11ff2eae37adb0015da296507ac37

  • memory/2384-19-0x000007FEF5953000-0x000007FEF5954000-memory.dmp

    Filesize

    4KB

  • memory/2384-20-0x0000000000B40000-0x0000000000B4E000-memory.dmp

    Filesize

    56KB

  • memory/2384-23-0x000007FEF5950000-0x000007FEF633C000-memory.dmp

    Filesize

    9.9MB