Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 05:41

General

  • Target

    Trojan.Win32.Zombie.exe

  • Size

    88KB

  • MD5

    61798e88e0f8120b112d44e91a5c5cc0

  • SHA1

    555647d55b2a87a846ff8ded96c9d8463c401895

  • SHA256

    4d800505df05f4cd72d21a9cfc90d6fc6259b7b348c638dfb8a7266c82bec558

  • SHA512

    6e75abc4ea6ac89fc8da550d2d37b6ebff9a07336818d6278b69f7338af5d45bfe45bfa8686c3fb64101097361b3450f5d5ac03976e904f5ecb6d189190b66d1

  • SSDEEP

    1536:W7ZhA7pApMaxB4b0CYJ97lEVqNR7Yge+ejy0Wjy0WzYgqeG:6e7WpMaxeb0CYJ97lEYNR73e+eGG1qeG

Score
9/10

Malware Config

Signatures

  • Renames multiple (4568) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Zombie.exe
    "C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Zombie.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-656926755-4116854191-210765258-1000\desktop.ini.tmp

    Filesize

    88KB

    MD5

    9fa61b569a27ca5141eadb4dd93f079b

    SHA1

    e1e00fc3e82db8f11128f3060eb0284cb85e7e32

    SHA256

    4bd5ae563b41481574b9136083350eca3953b6cb45135ee66392aafec1d90b66

    SHA512

    d00f8ca6bf9b64d4a7d61afb02bd85c4bada7ce5e90950d3512cb0de83a9cb7f5bd88debb3395f74a442e030d12e3b5674881a7dfaa30fb1e766a6cad06445d0

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    187KB

    MD5

    9cea051b9cd4a9a1fcc75f9b204737cb

    SHA1

    a8c81744417122ee1c963e590fe1b1937bcfa12a

    SHA256

    c0717f50e7cb7c3253246737cc390a04c18745ee2ef90baebda31a6cdf9a9055

    SHA512

    104fa88315a0b9df2e82dabbe34fd7ce481cbf74eeb81e24a09115f454a25d150d3a12b10ee147d6cb20854c1d9cade373a6335ab69c9dd2532180311059a5b4