Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 00:28
Behavioral task
behavioral1
Sample
45428f6df3f06fa14f580e035f7ee950f0517c45d14e6f446af19dce921bda74N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
45428f6df3f06fa14f580e035f7ee950f0517c45d14e6f446af19dce921bda74N.exe
Resource
win10v2004-20240802-en
General
-
Target
45428f6df3f06fa14f580e035f7ee950f0517c45d14e6f446af19dce921bda74N.exe
-
Size
571KB
-
MD5
14c34996703a2ea48391d760c7a1de20
-
SHA1
6d1709b7fda47e19f9e2659feca125578c8aae98
-
SHA256
45428f6df3f06fa14f580e035f7ee950f0517c45d14e6f446af19dce921bda74
-
SHA512
a342416a7e160d236692457169553cac5c9f62ec1be03ff780efdf950c3df31d608a28e7d0f1a1f80f2c353900b986ae9df72ce1ae5a4ea9400a216ec8bf98f8
-
SSDEEP
6144:nE7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQ4HQHQQf+L+JV:E7a3iwbihym2g7XO3LWUyfh4Coc
Malware Config
Signatures
-
Renames multiple (4090) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 1940 Zombie.exe 1372 _7z.exe -
Loads dropped DLL 4 IoCs
pid Process 1952 45428f6df3f06fa14f580e035f7ee950f0517c45d14e6f446af19dce921bda74N.exe 1952 45428f6df3f06fa14f580e035f7ee950f0517c45d14e6f446af19dce921bda74N.exe 1952 45428f6df3f06fa14f580e035f7ee950f0517c45d14e6f446af19dce921bda74N.exe 2836 Process not Found -
resource yara_rule behavioral1/memory/1952-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/files/0x00080000000120f9-3.dat upx behavioral1/memory/1940-13-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/files/0x0009000000016ca5-15.dat upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe 45428f6df3f06fa14f580e035f7ee950f0517c45d14e6f446af19dce921bda74N.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 45428f6df3f06fa14f580e035f7ee950f0517c45d14e6f446af19dce921bda74N.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jre7\lib\zi\America\Panama.tmp Zombie.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\System.Windows.Presentation.resources.dll.tmp Zombie.exe File created C:\Program Files\Mozilla Firefox\api-ms-win-crt-stdio-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\libqsv_plugin.dll.tmp Zombie.exe File created C:\Program Files\7-Zip\7zCon.sfx.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-masterfs-nio2_ja.jar.tmp Zombie.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\Workflow.Targets.tmp Zombie.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\System.IO.Log.Resources.dll.tmp Zombie.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\WindowsBase.resources.dll.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\weather.css.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_few-showers.png.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\baseAltGr_rtl.xml.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\vlc.mo.tmp Zombie.exe File created C:\Program Files\Windows Media Player\ja-JP\WMPMediaSharing.dll.mui.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\it.txt.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\tiptsf.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-jvm.jar.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\trad_s.png.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\library.js.tmp Zombie.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\distribute_form.gif.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_gather_plugin.dll.tmp Zombie.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\mshwjpnr.dll.tmp Zombie.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\System.Printing.resources.dll.tmp Zombie.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\fr-FR\InkObj.dll.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\NavigationUp_ButtonGraphic.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Chihuahua.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-favorites.jar.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\Pacific\Nauru.tmp Zombie.exe File created C:\Program Files\Mozilla Firefox\maintenanceservice.exe.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\14.png.tmp Zombie.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\en-US\TipRes.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\msadce.dll.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_specialocc_Thumbnail.bmp.tmp Zombie.exe File created C:\Program Files\Microsoft Games\FreeCell\desktop.ini.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\diner_s.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\com.jrockit.mc.rjmx.descriptorProvider.exsd.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\logo.png.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\47.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.mbeanbrowser.ja_5.5.0.165303.jar.tmp Zombie.exe File created C:\Program Files\Java\jre7\bin\tnameserv.exe.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\vlc.mo.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\demux\libasf_plugin.dll.tmp Zombie.exe File created C:\Program Files\Windows Photo Viewer\PhotoViewer.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\license.html.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.jetty.util_8.1.14.v20131031.jar.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\control\libwin_hotkeys_plugin.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\en-US\msadcfr.dll.mui.tmp Zombie.exe File created C:\Program Files\Windows Media Player\wmpnetwk.exe.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-waxing-gibbous_partly-cloudy.png.tmp Zombie.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\cryptocme2.dll.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-uihandler.xml.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\Pacific\Fiji.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Manila.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\back_lrg.png.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\gu.txt.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\library.js.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\.lastModified.tmp Zombie.exe File created C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\fr-FR\MSTTSLoc.dll.mui.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\gtkHandle.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-favorites_ja.jar.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\Europe\Volgograd.tmp Zombie.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45428f6df3f06fa14f580e035f7ee950f0517c45d14e6f446af19dce921bda74N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1952 wrote to memory of 1940 1952 45428f6df3f06fa14f580e035f7ee950f0517c45d14e6f446af19dce921bda74N.exe 30 PID 1952 wrote to memory of 1940 1952 45428f6df3f06fa14f580e035f7ee950f0517c45d14e6f446af19dce921bda74N.exe 30 PID 1952 wrote to memory of 1940 1952 45428f6df3f06fa14f580e035f7ee950f0517c45d14e6f446af19dce921bda74N.exe 30 PID 1952 wrote to memory of 1940 1952 45428f6df3f06fa14f580e035f7ee950f0517c45d14e6f446af19dce921bda74N.exe 30 PID 1952 wrote to memory of 1372 1952 45428f6df3f06fa14f580e035f7ee950f0517c45d14e6f446af19dce921bda74N.exe 31 PID 1952 wrote to memory of 1372 1952 45428f6df3f06fa14f580e035f7ee950f0517c45d14e6f446af19dce921bda74N.exe 31 PID 1952 wrote to memory of 1372 1952 45428f6df3f06fa14f580e035f7ee950f0517c45d14e6f446af19dce921bda74N.exe 31 PID 1952 wrote to memory of 1372 1952 45428f6df3f06fa14f580e035f7ee950f0517c45d14e6f446af19dce921bda74N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\45428f6df3f06fa14f580e035f7ee950f0517c45d14e6f446af19dce921bda74N.exe"C:\Users\Admin\AppData\Local\Temp\45428f6df3f06fa14f580e035f7ee950f0517c45d14e6f446af19dce921bda74N.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1940
-
-
C:\Users\Admin\AppData\Local\Temp\_7z.exe"_7z.exe"2⤵
- Executes dropped EXE
PID:1372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD51ae750cbe0a6f2cc3b50a9b8d0e78883
SHA161992ae6a4ed0793900caa2a0b58af0dff5ced5a
SHA25613fa59e80b9cd42a89fd537b8780db382989cb36606831fca75df247e1e94e59
SHA51212fa919e024709748374604c5c1eba40c7ebd7d9249646aefdf579faecb3a5a8833447911b3ef1002748a37f6d70a3de806b7519a045eb493fb4feb572ed89cf
-
Filesize
544KB
MD51d4cf7e1503382452e4c9c86cc138e6e
SHA1c5f2a375a71a29c3918c14b24c63e327d5365b88
SHA256cb0c646dc2a28f5fcadd7683e55a17c5f088c3b7f2009a83ee17424bfefb4a68
SHA51284b1ba1d0f850662d8956bcd11440b1125664d815dd1d9e36aa6f094e4a726b53e55d0ddce356da6afcb42adcaf939dbf9c19bbcaf02a183140922ff3850c9d5
-
Filesize
27KB
MD500055bc4caee8f4422b6c3d84c09fb4f
SHA15c6d365b745a00f94ed17fc6f3dea55661bb35aa
SHA256697cbe42570a9ac3aa98a97fa6195883d1253b62886f564ba8c0afd2ed7cba75
SHA5121a9b2c10573b8550caf8575ba0f37c81ff520528d6ecd854261e1e3a64ad76dfa66921d228088952241f0e3627dabbbbdfe9a4b41f62e530ee437811b2d74544