Analysis

  • max time kernel
    120s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-09-2024 01:22

General

  • Target

    04a71f4429bed8d039e6ef7b8f500e00N.exe

  • Size

    89KB

  • MD5

    04a71f4429bed8d039e6ef7b8f500e00

  • SHA1

    ee9328166626a40c390081d42d82b663cab8cd7d

  • SHA256

    28afc3241063e9d5d70540185e3ae7a14fb0a33649bbbbf14cc6c0b36b3d4d36

  • SHA512

    d76e08828af3f142f3624594b4ae3ba9348dc508f1a63a4cc6d5695381d1543f6caee81000a1cfed4df0f5bba0e4df2ff33bfefdc968302b0163cf66608e2948

  • SSDEEP

    1536:W7ZhA7pApM21LOA1LOl6Ad7ZhA7pApM21LOA1LOl6AOJOOJD:6e7WpMgLOiLOfe7WpMgLOiLOm

Score
9/10

Malware Config

Signatures

  • Renames multiple (4657) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04a71f4429bed8d039e6ef7b8f500e00N.exe
    "C:\Users\Admin\AppData\Local\Temp\04a71f4429bed8d039e6ef7b8f500e00N.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4428
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-786284298-625481688-3210388970-1000\desktop.ini.exe

    Filesize

    49KB

    MD5

    5c95e6d8354935de61cf5ef84841419d

    SHA1

    89bd1e8c7b72411c1f49f9881b0c8aca44858622

    SHA256

    2a1ef29147986d489f6538520d8dde78a84155c8b0148ac004aacc44d50dee23

    SHA512

    18ea50e8078f0bfa172dc8fefcb0755b82a769095c2f33aa7e253f1ea3c9d592977c1a58e17ed408dfd34485b2d465f12b45efd5c0444d46f6f02592cbf59575

  • C:\Windows\SysWOW64\Zombie.exe

    Filesize

    48KB

    MD5

    4662244910ed9ea2b13cb1a907c444b0

    SHA1

    393c2d5ed6ef905226974384be33da056ed469ba

    SHA256

    312aeb6d2e836a6bdbb4a9bdad1b31691e8dc5516aad98b36d4d3f14c5711b85

    SHA512

    87ba46c1ad1c81aa172a5878c7830a2fb68a602863cc3010ac5bb010e670d86e31aaea8064acef96ed6d103d467f6ac5652be9608d40f84390f22f5488bb34e7