Analysis
-
max time kernel
120s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 23:46
Static task
static1
Behavioral task
behavioral1
Sample
bbd9622274814e7c111d3ffb3f1d74e0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bbd9622274814e7c111d3ffb3f1d74e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
bbd9622274814e7c111d3ffb3f1d74e0N.exe
-
Size
91KB
-
MD5
bbd9622274814e7c111d3ffb3f1d74e0
-
SHA1
a9105de161ec5af55848d75b839e61461103ab6c
-
SHA256
33c4a2ea8aa54e144b647750d211c9b58c57d459be298dcb8eb7cfd5f92c4418
-
SHA512
f195b5bcc509ad8853d4a1bbc7362a82452194dbaf57211e8a9d7199cefd02d93144cab7704db0e5741dd89051bdf460e63b2e957b1d7441d3d832a8a7308cc4
-
SSDEEP
768:W7Blp9pARFbhjJQWJQuvGjDE+BqKFkszYUzf2JdmwdAsCeHvJ5YFvqix3DZzmg0i:W7Z9pApjJQWJQVFUgCEHixUPig1juYow
Malware Config
Signatures
-
Renames multiple (3328) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 2800 Zombie.exe 2876 _createdump.exe -
Loads dropped DLL 4 IoCs
pid Process 3052 bbd9622274814e7c111d3ffb3f1d74e0N.exe 3052 bbd9622274814e7c111d3ffb3f1d74e0N.exe 3052 bbd9622274814e7c111d3ffb3f1d74e0N.exe 2540 Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Zombie.exe bbd9622274814e7c111d3ffb3f1d74e0N.exe File created C:\Windows\SysWOW64\Zombie.exe bbd9622274814e7c111d3ffb3f1d74e0N.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\DVD Maker\Shared\DvdStyles\shadowonlyframe_videoinset.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Ust-Nera.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\locale\core_visualvm.jar.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\America\Halifax.tmp Zombie.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\PresentationFramework.dll.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\btn-back-static.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Postage_SelectionSubpicture.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ui_2.3.0.v20140404-1657.jar.tmp Zombie.exe File created C:\Program Files\Mozilla Firefox\api-ms-win-core-file-l2-1-0.dll.tmp Zombie.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\System.ServiceModel.Resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\feature.xml.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-execution.xml.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\Colombo.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\lua\http\images\vlc16x16.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_specialocc_Thumbnail.bmp.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core-windows.xml.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-core-kit_zh_CN.jar.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-sendopts.jar.tmp Zombie.exe File created C:\Program Files\Java\jre7\bin\awt.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Games\Purble Place\desktop.ini.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\NavigationLeft_ButtonGraphic.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationLeft_ButtonGraphic.png.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\ms.pak.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\setNetworkServerCP.bat.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Metlakatla.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Chita.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\SystemV\YST9YDT.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\liba52_plugin.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.nl_zh_4.4.0.v20140623020002.jar.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.metadata_2.2.0.v20131211-1531.jar.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\jquery-ui-1.8.13.custom.css.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\micaut.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\OFFICE14\CsiSoap.dll.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationRight_ButtonGraphic.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.osgi.services.nl_ja_4.4.0.v20140623020002.jar.tmp Zombie.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\UIAutomationClientsideProviders.resources.dll.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_heb.xml.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\LightBlueRectangle.PNG.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Juneau.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\ECLIPSE_.SF.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.http.registry_1.1.300.v20130402-1529.jar.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-autoupdate-cli_zh_CN.jar.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-awt_ja.jar.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationLeft_ButtonGraphic.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Scenes_LOOP_BG_PAL.wmv.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\bn.pak.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\cpyr.htm.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\Qyzylorda.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\modules\host.luac.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_SelectionSubpicture.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_ja_JP.jar.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Kuching.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\PST8PDT.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\updater_ja.jar.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\America\Glace_Bay.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\highlight.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\ij.bat.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\epl-v10.html.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\MET.tmp Zombie.exe File created C:\Program Files\Microsoft Games\Hearts\HeartsMCE.png.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\InkObj.dll.mui.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Kaliningrad.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.console_1.1.0.v20140131-1639.jar.tmp Zombie.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbd9622274814e7c111d3ffb3f1d74e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2800 3052 bbd9622274814e7c111d3ffb3f1d74e0N.exe 31 PID 3052 wrote to memory of 2800 3052 bbd9622274814e7c111d3ffb3f1d74e0N.exe 31 PID 3052 wrote to memory of 2800 3052 bbd9622274814e7c111d3ffb3f1d74e0N.exe 31 PID 3052 wrote to memory of 2800 3052 bbd9622274814e7c111d3ffb3f1d74e0N.exe 31 PID 3052 wrote to memory of 2876 3052 bbd9622274814e7c111d3ffb3f1d74e0N.exe 32 PID 3052 wrote to memory of 2876 3052 bbd9622274814e7c111d3ffb3f1d74e0N.exe 32 PID 3052 wrote to memory of 2876 3052 bbd9622274814e7c111d3ffb3f1d74e0N.exe 32 PID 3052 wrote to memory of 2876 3052 bbd9622274814e7c111d3ffb3f1d74e0N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbd9622274814e7c111d3ffb3f1d74e0N.exe"C:\Users\Admin\AppData\Local\Temp\bbd9622274814e7c111d3ffb3f1d74e0N.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\_createdump.exe"_createdump.exe"2⤵
- Executes dropped EXE
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD52c373d3bc7edf8be79b7cfe2ee1d3224
SHA1e74eeae072f0bdf543206d9e70f1d0a5f1c6eda6
SHA256b2f27a4431d829e0790e96c602c8ff0a98b767ff7a12955c42cf8e282fa37341
SHA51231924f28374d443d705fafe68e3755ea76f293bdc0a0809d71f27627016fada2de743824714945dee4d42ca959c79852bb27b6d33a87ff0b56f63b2d8dbd9d72
-
Filesize
54KB
MD59ca726be24244f2cf7e2dec95b714c46
SHA1db976e979ec442e03799a26e861dc21847afe79a
SHA256a6324117d0f5b16d0ecaccd1497f471495e4b3d315f1df0da66758d0bbab18af
SHA5128e44e93e4cafba0cb6d3ad2d5f5935f5961cef0c841e534865f9f74f15f5d9007c6d304a597b97641d7cc001a1ef4675b4d19775ea7f4b9a778a882f3deeb449
-
Filesize
36KB
MD55a7b2ba8007b8c5600f2ab0afbf52e96
SHA132775e957f3f981e4889607de5f532430930d147
SHA256503b61a50e34cc18ed1b758350c5d5f7810d52819c35ab8bc83bdf2d0e58cea6
SHA51256e7ad7bdbcaae2d0645feac683d456c99dfb9590e1d4c98f70b42e220111a8c393ae2e09c97cdc130c05fc2a9b24c7e144e2f666d6944c51a3c6d156e59cd5d