Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:09

General

  • Target

    Trojan.Win32.Zombie.exe

  • Size

    80KB

  • MD5

    5d04ce418d3d50aa2b9fad6e4ecaa520

  • SHA1

    8570c4c26a33ca5db08f75ef149b89af9e38779e

  • SHA256

    6a119d6591d9c632e0022ef3de7c3014166538571e430f7a575d7d838f9a667d

  • SHA512

    572b9d23fd1572c058a8245f47a7c6551efea14bed0a5d002ea8cfd27cb92e042b3bebbe57f7a7d9c0ea92ae362344c03e5eb7aacbe4e1925f901d9b9e61c56c

  • SSDEEP

    1536:W7ZNLpApCZrt8PWGoPWGANdN+hEwHwDvZvGrVQb+:6NLWpCZIzjwHwIreC

Score
9/10

Malware Config

Signatures

  • Renames multiple (3517) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Zombie.exe
    "C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Zombie.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    80KB

    MD5

    193c33a126d5ac2c52542cb87ff3e98e

    SHA1

    e2e249ad9218914fe1cea9364f62479994736787

    SHA256

    11d0544732efb212c64377849ef2b9d158e3395b2f1a587010a39c5e489b379f

    SHA512

    d5a67226a575284a7dbddb4e730c32045f9f65112dc5d154a74902f71203784cc8805c76a38e4de231bb6118c9fce1066b8f69120db8fb01898c63015ebaeade

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    89KB

    MD5

    2c6e18063c2b06f5b95fcd519595290b

    SHA1

    eccb2f57451dcd97a4ec7a6e6adba158a1ec1641

    SHA256

    1218e61f2d47d01b14449a94f4e564b753ff958ddcefa8a5bf0d6b9d46683df8

    SHA512

    f7bbf2c564dda63c56c58a02f05afd6d92681eb72f789973211d62d6ade28021778e7f3b8f4b7f4f30547fd71ef72eb584eaaf39a0e0b82457eb085697d1c84f