Analysis
-
max time kernel
96s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 02:19
Static task
static1
Behavioral task
behavioral1
Sample
c38e535c07aa3e9019e70c81c3462e8a80fee096d031049f1e320761f203a204.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c38e535c07aa3e9019e70c81c3462e8a80fee096d031049f1e320761f203a204.exe
Resource
win10v2004-20240802-en
General
-
Target
c38e535c07aa3e9019e70c81c3462e8a80fee096d031049f1e320761f203a204.exe
-
Size
59KB
-
MD5
47a750050fe6eec55376e4e112cfde18
-
SHA1
eec443aa61fc932c62398a09d4a769ed94b67d24
-
SHA256
c38e535c07aa3e9019e70c81c3462e8a80fee096d031049f1e320761f203a204
-
SHA512
a1e5e9e4396d3fceeca6ea08eb707220239f6aa310ac10ae37f8757b026816376d83063ca641910efa21053f7a5c0d36c6e97d2bc3c35a7e9ea947db9f472a07
-
SSDEEP
384:GBt7Br5xjL9AgA71Fbhv7bhvo42L5FgAytBrmO3tV3o0C1HEd2nBpgi97JBJBbea:W7BlpppARFbhjbhg42LcfDtbsvThCq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4832 Zombie.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe c38e535c07aa3e9019e70c81c3462e8a80fee096d031049f1e320761f203a204.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe c38e535c07aa3e9019e70c81c3462e8a80fee096d031049f1e320761f203a204.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c38e535c07aa3e9019e70c81c3462e8a80fee096d031049f1e320761f203a204.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c38e535c07aa3e9019e70c81c3462e8a80fee096d031049f1e320761f203a204.exe"C:\Users\Admin\AppData\Local\Temp\c38e535c07aa3e9019e70c81c3462e8a80fee096d031049f1e320761f203a204.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1148 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
PID:4832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD54982b498cfe70a56a064fdb2a8089f6d
SHA1b341d9620474a41e450d87cc2f5bcdab41a504af
SHA25680ddc31e03c88b2afd7b6bd723529e52f39f21d8b79bf4ed14ac27f53caf312f
SHA51289cd7b944b1192c8bef50277f3384eb1252750fc9eb671ccbfdcf9c8aa7e06f35f51ba8a79820886dc43eb745a88f0734cf2b263e3a057aae33ec8bae8e00be5