Analysis
-
max time kernel
30s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 00:14
Static task
static1
Behavioral task
behavioral1
Sample
5c49dbc1728b25a32785be703c7fcfb0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5c49dbc1728b25a32785be703c7fcfb0N.exe
Resource
win10v2004-20240802-en
General
-
Target
5c49dbc1728b25a32785be703c7fcfb0N.exe
-
Size
40KB
-
MD5
5c49dbc1728b25a32785be703c7fcfb0
-
SHA1
3ef969130688a5c11bc2845fefd1998bfd071bad
-
SHA256
0d991f0da07600f28a6173fa49c626e2a1c4f3a475c0334c8e48fb1ff4e75a40
-
SHA512
f40fdd4e70fe28a521876c24761715649669af8c416c19f6ad9b081d52c5dcdee8539325e0ecbae7d6da4212531332c3db99ac1582c0a984e65fa9e1fe973bd6
-
SSDEEP
384:GBt7Br5xjL9A7AgA71FbhvkLpqjw/1nCPxnbY:W7BlphA7pARFbhSpKw/1nWxbY
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe 5c49dbc1728b25a32785be703c7fcfb0N.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 5c49dbc1728b25a32785be703c7fcfb0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c49dbc1728b25a32785be703c7fcfb0N.exe