Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-08-2024 02:31

General

  • Target

    cff8ab1dfa13e7bef413d2578502cf466d75f05c5a73bab7bfb634470dba57ea.exe

  • Size

    83KB

  • MD5

    1319481afa3f52271810a1ace6fc7e2d

  • SHA1

    93a31ba7fe4668bdd248d5d9c2deedf72958fdd0

  • SHA256

    cff8ab1dfa13e7bef413d2578502cf466d75f05c5a73bab7bfb634470dba57ea

  • SHA512

    9d052f2c64aa1efe07763ecfa055c8d8eec9641d0938fce95a79f2bf53e33a6f8bcb23365a4f59cfbd11e3a7a45ae305a08515e180565d74bc70d7db1c31ad80

  • SSDEEP

    1536:W7ZhA7pApM21LOA1LO2c6b25gc6b25uCrbpSvr5xpYr0ARZF6NFVogjQlRv/L6:6e7WpMgLOiLO2c6b25gc6b25uwUhQ7X+

Score
9/10

Malware Config

Signatures

  • Renames multiple (5254) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cff8ab1dfa13e7bef413d2578502cf466d75f05c5a73bab7bfb634470dba57ea.exe
    "C:\Users\Admin\AppData\Local\Temp\cff8ab1dfa13e7bef413d2578502cf466d75f05c5a73bab7bfb634470dba57ea.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3492
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:3728
    • C:\Users\Admin\AppData\Local\Temp\_checksum.exe
      "_checksum.exe"
      2⤵
      • Executes dropped EXE
      PID:3700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-786284298-625481688-3210388970-1000\desktop.ini.exe

    Filesize

    48KB

    MD5

    fab6fabf558b4877cd25ecc06ab37e73

    SHA1

    8d3d3078dc00a9a968c323f23cea7a76d426eb82

    SHA256

    46c06892ce1404bfc2ef126f6e30619ffb9c9813a146b1788faf5686d1ce53df

    SHA512

    b288eacc0c6bf5d893563baa142198519272c420877a58b9750b549e5c0c62116cc9a3781fb0ffebda6e3d2b3492d5eb85fc19c060184c63fb4b9870d57222fc

  • C:\Users\Admin\AppData\Local\Temp\_checksum.exe

    Filesize

    35KB

    MD5

    23f049f14ca0e68af4b9883514791dfe

    SHA1

    1224ecfda221e54d4536a4ac102a56235320ee25

    SHA256

    9562aabe1f71d7ff5ec879fd2fb5cfe4be2c8f62a7fa5a1aa49660c3a495f1fb

    SHA512

    ce91cd089a299ba88f047cf15fd06673389942dabbf8be5bf2e2666e1048bc6da261ce30cae1e2ecb3b50392441a335bf97cc4ed51540554bedabe65590be677

  • C:\Windows\SysWOW64\Zombie.exe

    Filesize

    47KB

    MD5

    07eb1d1f5a0529b62a8d20202adf1fa6

    SHA1

    5cd62b14600234c4d3b2b9e182684a9512b1dcca

    SHA256

    af173d1a09b37de8f1d3fe3976c30d8f26cbf58cc20dae6a14f7b5b77f8fd212

    SHA512

    5402a62896f7971faa59ccc4d9e13cbdf64e58d67e1774318c676de661e65c1dd44ff5e123ee89098899122d501c42f9b9b11ff2eae37adb0015da296507ac37

  • memory/3700-21-0x00007FF990C73000-0x00007FF990C75000-memory.dmp

    Filesize

    8KB

  • memory/3700-22-0x0000000000E40000-0x0000000000E4E000-memory.dmp

    Filesize

    56KB

  • memory/3700-30-0x00007FF990C70000-0x00007FF991731000-memory.dmp

    Filesize

    10.8MB

  • memory/3700-1995-0x00007FF990C70000-0x00007FF991731000-memory.dmp

    Filesize

    10.8MB