Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 13:59
Static task
static1
Behavioral task
behavioral1
Sample
9a138c1bac186a5e643293702295ad00N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9a138c1bac186a5e643293702295ad00N.exe
Resource
win10v2004-20240802-en
General
-
Target
9a138c1bac186a5e643293702295ad00N.exe
-
Size
2.4MB
-
MD5
9a138c1bac186a5e643293702295ad00
-
SHA1
ca31edeb2d441c5e1d073e380733ae21b8eee204
-
SHA256
ea7e34d6c49c3b9be3861cbe39b7c746c7e2d2cd631bcc5ee3d185193d6b949b
-
SHA512
ead5169842a5c39e5e84ea0de976d366002dd1b40a2750904760938859137a6cc4d259b9f51ec83be18fc2c2f97e9f9a0e5f9c84605906d329ede725388f03a5
-
SSDEEP
49152:qGlWC3YlQt8CWVQ7VFGogWAcF8jH7VaOtXc9:cQ3YI+K
Malware Config
Signatures
-
Renames multiple (4587) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 1876 Zombie.exe 3380 _NisSrv.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe 9a138c1bac186a5e643293702295ad00N.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 9a138c1bac186a5e643293702295ad00N.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Diagnostics.TraceSource.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\Configuration\ssn_high_group_info.txt.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-ES\rtscom.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hans\UIAutomationTypes.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\colorimaging.md.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\deploy\[email protected] Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusEDUR_SubTrial-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-core-debug-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\ucrtbase.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription2-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription4-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.contrast-white_scale-100.png.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\insertbase.xml.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\System.Windows.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\server\classes.jsa.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdR_Retail-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\.version.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.IO.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\lib\jvm.lib.tmp Zombie.exe File created C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-3101-0000-1000-0000000FF1CE.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Word2019R_OEM_Perp-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.contrast-black_scale-100.png.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Diagnostics.Contracts.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\hr.txt.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\MEIPreload\preloaded_data.pb.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Retail-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOMessageProvider.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\UIAutomationClientSideProviders.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pt-BR\PresentationCore.resources.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\pt-BR.pak.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-locale-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\ja-JP\InputPersonalization.exe.mui.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\ext\jfxrt.jar.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_Retail-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.scale-80.png.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsrus.xml.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Runtime.Handles.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\de\UIAutomationTypes.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\it\System.Windows.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_Retail-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_OEM_Perp-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogo.contrast-white_scale-80.png.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\ja-JP\msaddsr.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ko\PresentationUI.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\EduWorks Data Streamer Add-In\System.ValueTuple.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-file-l1-2-0.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.Http.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.NetworkInformation.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Text.Encoding.CodePages.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ja\UIAutomationProvider.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\images\cursors\win32_CopyNoDrop32x32.gif.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_Trial-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.contrast-white_scale-100.png.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pt-BR\UIAutomationProvider.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.Windows.Forms.Design.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\de\System.Windows.Input.Manipulations.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\System.Windows.Input.Manipulations.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\api-ms-win-crt-math-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\resources.jar.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\kk\msipc.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RUI.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipscht.xml.tmp Zombie.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a138c1bac186a5e643293702295ad00N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2824 wrote to memory of 1876 2824 9a138c1bac186a5e643293702295ad00N.exe 85 PID 2824 wrote to memory of 1876 2824 9a138c1bac186a5e643293702295ad00N.exe 85 PID 2824 wrote to memory of 1876 2824 9a138c1bac186a5e643293702295ad00N.exe 85 PID 2824 wrote to memory of 3380 2824 9a138c1bac186a5e643293702295ad00N.exe 86 PID 2824 wrote to memory of 3380 2824 9a138c1bac186a5e643293702295ad00N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a138c1bac186a5e643293702295ad00N.exe"C:\Users\Admin\AppData\Local\Temp\9a138c1bac186a5e643293702295ad00N.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1876
-
-
C:\Users\Admin\AppData\Local\Temp\_NisSrv.exe"_NisSrv.exe"2⤵
- Executes dropped EXE
PID:3380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5e5615888b6a1534d8b87fe52d2ef5dbb
SHA106dbcd091ca307bf1787cac54b1967db4f9ee8cb
SHA25646769fd21120c471c9d2fc88b526638c27f86b7843addc5661a1d7575dfc85e4
SHA5123acf7f9256bf24e869de4d98aa026d7365883869237ebd08551676ac4d8bdce6c85135c400a114783153b72a244ee3120652c3c33491f611ba1361455e7f0189
-
Filesize
2.4MB
MD5826bf13d3fefe2369ceec3e679d96b7c
SHA1c5fc719289ae948df373302bde739a0ac28ad573
SHA2563aabfccd7697584ef580225d8a78f4b1043f319215c3cbc3c461b398ada6e0b3
SHA51247d463df0b646960ae89288c95322f1e998bc479c71b2ad167ce9d194c629080628a2384c6003574aab1894a7d178b0eec3457f0d0425cc7c4ca2d67837e7e14
-
Filesize
62KB
MD5b93789d1b7af8d0390d3420b432166f0
SHA1e242cc93a9c2222b893c1cb316985e05b0998e2d
SHA256412a1f118fc425d544f6826c06963001750407dbf7889e33675261c989e44759
SHA512f333ff3499ae3134efed2bef0699c135c81aac37156d50ffa7f3fa758148b147925023fbbd53f3641050e2c8ac434939e8e7a307edfbde2dd5522c827ffb0b4f