Analysis

  • max time kernel
    119s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-09-2024 23:46

General

  • Target

    bbd9622274814e7c111d3ffb3f1d74e0N.exe

  • Size

    91KB

  • MD5

    bbd9622274814e7c111d3ffb3f1d74e0

  • SHA1

    a9105de161ec5af55848d75b839e61461103ab6c

  • SHA256

    33c4a2ea8aa54e144b647750d211c9b58c57d459be298dcb8eb7cfd5f92c4418

  • SHA512

    f195b5bcc509ad8853d4a1bbc7362a82452194dbaf57211e8a9d7199cefd02d93144cab7704db0e5741dd89051bdf460e63b2e957b1d7441d3d832a8a7308cc4

  • SSDEEP

    768:W7Blp9pARFbhjJQWJQuvGjDE+BqKFkszYUzf2JdmwdAsCeHvJ5YFvqix3DZzmg0i:W7Z9pApjJQWJQVFUgCEHixUPig1juYow

Score
9/10

Malware Config

Signatures

  • Renames multiple (4642) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bbd9622274814e7c111d3ffb3f1d74e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\bbd9622274814e7c111d3ffb3f1d74e0N.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4628
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:4632
    • C:\Users\Admin\AppData\Local\Temp\_createdump.exe
      "_createdump.exe"
      2⤵
      • Executes dropped EXE
      PID:4664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2412658365-3084825385-3340777666-1000\desktop.ini.exe

    Filesize

    36KB

    MD5

    9cb209647630dc142ea9cec946aa304e

    SHA1

    f85fe22ef005110f7ff2b311b0012224d6fc4ada

    SHA256

    2e024fd79fe34140fc6e7e5325aafb9c8ccbd8cbca039c69b57bab594c019f81

    SHA512

    3d63f85af2d14eccce80c0ef018c7ccc6df1b0ae7891c63846b0473f8ddccd3dc394f819ac2e449525a498952575ce3428c86af3985e00bed2926030ff524c13

  • C:\Users\Admin\AppData\Local\Temp\_createdump.exe

    Filesize

    54KB

    MD5

    9ca726be24244f2cf7e2dec95b714c46

    SHA1

    db976e979ec442e03799a26e861dc21847afe79a

    SHA256

    a6324117d0f5b16d0ecaccd1497f471495e4b3d315f1df0da66758d0bbab18af

    SHA512

    8e44e93e4cafba0cb6d3ad2d5f5935f5961cef0c841e534865f9f74f15f5d9007c6d304a597b97641d7cc001a1ef4675b4d19775ea7f4b9a778a882f3deeb449

  • C:\Windows\SysWOW64\Zombie.exe

    Filesize

    36KB

    MD5

    5a7b2ba8007b8c5600f2ab0afbf52e96

    SHA1

    32775e957f3f981e4889607de5f532430930d147

    SHA256

    503b61a50e34cc18ed1b758350c5d5f7810d52819c35ab8bc83bdf2d0e58cea6

    SHA512

    56e7ad7bdbcaae2d0645feac683d456c99dfb9590e1d4c98f70b42e220111a8c393ae2e09c97cdc130c05fc2a9b24c7e144e2f666d6944c51a3c6d156e59cd5d