Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 05:09

General

  • Target

    Trojan.Win32.Zombie.exe

  • Size

    80KB

  • MD5

    5d04ce418d3d50aa2b9fad6e4ecaa520

  • SHA1

    8570c4c26a33ca5db08f75ef149b89af9e38779e

  • SHA256

    6a119d6591d9c632e0022ef3de7c3014166538571e430f7a575d7d838f9a667d

  • SHA512

    572b9d23fd1572c058a8245f47a7c6551efea14bed0a5d002ea8cfd27cb92e042b3bebbe57f7a7d9c0ea92ae362344c03e5eb7aacbe4e1925f901d9b9e61c56c

  • SSDEEP

    1536:W7ZNLpApCZrt8PWGoPWGANdN+hEwHwDvZvGrVQb+:6NLWpCZIzjwHwIreC

Score
9/10

Malware Config

Signatures

  • Renames multiple (5103) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Zombie.exe
    "C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Zombie.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2718105630-359604950-2820636825-1000\desktop.ini.tmp

    Filesize

    80KB

    MD5

    a93be430fcbf34672b141a2f142de537

    SHA1

    63313a53b656414597a2ef421b9ba9096579e0bb

    SHA256

    6f248d67d088374fd84b471e56bc414b04110216287dd725149e8dbf44fe0e45

    SHA512

    a3a4c74fdee060025294bd2017b35062401fa19105cff2cf01e25fd5225d88bd75ea99a685a1f2a1c81f6fe28763ad96e8b66d9122874e89949ab74250dd79d6

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    179KB

    MD5

    d4c5315b19587267c1f8759fcd790cc6

    SHA1

    0e15ed8b3f940c2e926032def52c4b8e2762a598

    SHA256

    4e5a4c550a8ca772c70d1e9d8815927748195deaef650053fb2fce8195f68724

    SHA512

    d488ff7a92df4d17b9d68ccad8ab6700e6b7374a737e40b389bf1da70c0a899087585af1f66ee05b84cb5d2edbf8d29352de92cf6eff0453babe3b0eaa2def14