Resubmissions

12-09-2024 02:23

240912-cvfznswere 10

04-09-2024 00:09

240904-afvheascla 10

03-09-2024 18:57

240903-xl8csavfrb 10

03-09-2024 18:12

240903-ws828asgnm 10

Analysis

  • max time kernel
    77s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-09-2024 18:57

General

  • Target

    Ransomware/default.exe

  • Size

    211KB

  • MD5

    f42abb7569dbc2ff5faa7e078cb71476

  • SHA1

    04530a6165fc29ab536bab1be16f6b87c46288e6

  • SHA256

    516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd

  • SHA512

    3277534a02435538e144dea3476416e1d9117fcddef3dcb4379b82f33516c3e87767c3b0d2b880e61a3d803b583c96d772a0bdeecbfc109fe66444e9b29216af

  • SSDEEP

    6144:zia1vcaEaA+HPsISAzG44DQFu/U3buRKlemZ9DnGAeWBES+:zHctWvVSAx4DQFu/U3buRKlemZ9DnGAn

Malware Config

Signatures

  • Detects Zeppelin payload 4 IoCs
  • Zeppelin Ransomware

    Ransomware-as-a-service (RaaS) written in Delphi and first seen in 2019.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ransomware\default.exe
    "C:\Users\Admin\AppData\Local\Temp\Ransomware\default.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe" -start
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1712
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1712 -s 1928
        3⤵
        • Program crash
        PID:1072
    • C:\Windows\SysWOW64\notepad.exe
      notepad.exe
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2408
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1712 -ip 1712
    1⤵
      PID:2040

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB

      Filesize

      2KB

      MD5

      e496751cd2219f672baccfe069c05607

      SHA1

      d43326345986e0c3a25bcfef2febf570a1794915

      SHA256

      272f89d727d01fec581fffb1a38e02ce025eb523663aa3e102f77ae9aa9e0f1b

      SHA512

      e84c7c29f3aa5b2184bd6590f3660ec3c67b5814e226f4f7c4ae9bfb11080ab0eb2fe43697710bd64beef869e368fa1ddd85495f7f92b0ff6a61a9c59264b5b2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_268232F9B7ADFD0751C3D83F667CFB78

      Filesize

      472B

      MD5

      d554992d4494a99ee1cb814b6a475ac0

      SHA1

      28f5679ab12b98f1e1cb1db81cc45d2e81bd7eae

      SHA256

      2305f09094b346b7d121fdf848cd807e31fd3d788e1dd12bab77963dd792c0cf

      SHA512

      00da55828c7237ce5086b21b0bbeaa73c45ce13b974fc5881e4390d78118721abe690879b21c7b638bbfba7c001d06ddec2db51bd287dd8d8c129f69ee7b2e76

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

      Filesize

      1KB

      MD5

      d8e9a72a6c3f0f85aa9c1191fd7f475b

      SHA1

      6ca59986f7442dd4cc86f8d9ccbbe60bf0bb5521

      SHA256

      7be0516557405ce6902e0029557412f8c439745532018adc581770b4177edaa3

      SHA512

      186de583be2ab6928a31ca38fd6419437a26a3c7c75c854818ccf48ec6d79fa76902cb1ed0168772d4aaf817a26263b8f0a2d9dc338d86d5fa2433920fc16bd3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB

      Filesize

      484B

      MD5

      b64c323c9cf41f906ffef889d9176e8a

      SHA1

      3d9d5f7be45db4d22bafc46c411f671020adabc1

      SHA256

      a89bfbe23ffcb120e9e417dbf531cf47aa3c01e673b0841798f5f3e55dd2bc30

      SHA512

      9d586b1862121dfd48ec238d1f9cca5ed2d8166f37181efc2bcae9f148ba36a7eb6633bcaa25642516d220d6247703076f818a3f6a15744b05fe7be3fee35148

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_268232F9B7ADFD0751C3D83F667CFB78

      Filesize

      488B

      MD5

      ae69610bc577f2a2a2646c3e3b07ae69

      SHA1

      ea45cd00b649850947be9b37b6ad8bbc9f37a418

      SHA256

      7108a7e3f39ec99b9c43f7c6a822d5921489f158c25bbd3f7673a90f04dfca27

      SHA512

      481df1ea07052ddd45b82caeaf34e5f4b8ed371841a235bf35f44353ef08f3e802138788f2e80ea89a1cf49fc61d2e8c55e98b7b130b3c547994770e98a8e1b4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

      Filesize

      482B

      MD5

      d2b68cbb735d2a269060774e3498d55c

      SHA1

      ffceeb146d0af664ccff2b1a7852991ff3bca99f

      SHA256

      e676f07190e385b01303db0958516d7c819d53540edf4466a3a5c9f65c0be45a

      SHA512

      9187b30e2074cf51a0dcbaa2e3c668f4cb93bce1bb1a7d3d451114cc4e13ec6d09cd0157d5cc527b8fa49ecf836ecdc622b4a5cbaf68448015c5697d183932d8

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\WLXU5DI6\PKZ1HJBP.htm

      Filesize

      190B

      MD5

      6ebbeb8c70d5f8ffc3fb501950468594

      SHA1

      c06e60a316e48f5c35d39bcf7ed7e6254957ac9e

      SHA256

      a563426e24d132cd87b70d9cb5cd3d57c2e1428873a3f3eb94649cf42e37b6a1

      SHA512

      75cfab1c9f5a05c892cf3b564aed06d351c6dc40048faea03ae163154ff7635252817d66b72a6ef51c4f895eebf7728f302df51148acce2a0c285502bf13652c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZK5NPJWQ\6DP8LBCK.htm

      Filesize

      18KB

      MD5

      3c9fb9fbbdd372a9ab7f4e11cde5e657

      SHA1

      06f7b35568d81ca65e30ac213ff1031220ac090f

      SHA256

      f363ad44f70cd532e08a53e7ea0323f68d2b58b448349034ccc3dc3b0a96296f

      SHA512

      dd585b080863512a9a933e39d7542b13b3501f43ddfbd153e266964c37846e4d7ebd798512f705457c2be74a80a1d0aaf98c11ba5e6c2ca3f07f29eee1f68fcb

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe

      Filesize

      211KB

      MD5

      f42abb7569dbc2ff5faa7e078cb71476

      SHA1

      04530a6165fc29ab536bab1be16f6b87c46288e6

      SHA256

      516475caf3fbd1f0c0283572550528f1f9e7b502dce5fb6b89d40f366a150bfd

      SHA512

      3277534a02435538e144dea3476416e1d9117fcddef3dcb4379b82f33516c3e87767c3b0d2b880e61a3d803b583c96d772a0bdeecbfc109fe66444e9b29216af

    • memory/1712-43-0x0000000000730000-0x0000000000870000-memory.dmp

      Filesize

      1.2MB

    • memory/1712-44-0x0000000000730000-0x0000000000870000-memory.dmp

      Filesize

      1.2MB

    • memory/2216-31-0x0000000000F00000-0x0000000001040000-memory.dmp

      Filesize

      1.2MB

    • memory/2408-21-0x0000000000AE0000-0x0000000000AE1000-memory.dmp

      Filesize

      4KB