Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:10

General

  • Target

    Trojan.Win32.Zombie.exe

  • Size

    79KB

  • MD5

    8f5ff271993998e0388d498274572510

  • SHA1

    b68368b7ba9009c545bb3864b7f59cfee5a65080

  • SHA256

    918c4401e1348bffca7ef5df0c9f5ebd185dde6edcfd64d75ed3af8b67f4992b

  • SHA512

    ed135ba4aad4cf569726a9e4349c58385c6f63fcf1a9c6cba238a90c5ba2d93e9525bb7a4ddaa592d9279f44d3497abdb7b82ee38febe574684fffa5c6a1c6bf

  • SSDEEP

    1536:W7ZhA7dAZ1++PJHJXA/OsIZfzc3/Q8zx0Cq/8S/8dY6:6e76mQSop8i8/

Score
9/10

Malware Config

Signatures

  • Renames multiple (3487) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Zombie.exe
    "C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Zombie.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

    Filesize

    79KB

    MD5

    9ac203d8d09ac61cdc90dc507cfff104

    SHA1

    3b62ca0d1f9d41f1e8be89584ffed4a00d4fb114

    SHA256

    29d27dbdb844a35e77ca6562ed5f599b61d5fa30b0391402bf11bbc0bfb96586

    SHA512

    061e420fbf50c6895a575467401bec52809cca428e7e92ab4153ba11f59bc0576cfc4ace5ad604010f4c31f7fe949700120152356e5f5e20ddbdd30b5ac4ac57

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    88KB

    MD5

    f372a102e93ed6f6b89c1e000efffd79

    SHA1

    0939941bc54cabf1e861ed62791ecabe574548de

    SHA256

    1e205d6a71d2aee164d2015ad61468399e1b540ae6aa279082e8a33b7219bd22

    SHA512

    760c4b9851e531e5d0e53e2b3329e8deb5558fb14a5631c7612243ed9b6eafb8c56d61cd53eba1551ddf4a1b8a31704ad2b2849e5de7a0b78f7f71922d10f4fb