Analysis
-
max time kernel
60s -
max time network
60s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 19:09
Behavioral task
behavioral1
Sample
2e5a45ed4358e73b8d87a5762d4f39f26dad4f0fed64de648b9a8a9c4a73b913.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2e5a45ed4358e73b8d87a5762d4f39f26dad4f0fed64de648b9a8a9c4a73b913.exe
Resource
win10v2004-20240802-en
General
-
Target
2e5a45ed4358e73b8d87a5762d4f39f26dad4f0fed64de648b9a8a9c4a73b913.exe
-
Size
2.4MB
-
MD5
957ce4e793a1e90fea00021e6b1ee3f6
-
SHA1
3872baf0a775c06870bd32ddd92a3923a093bab1
-
SHA256
2e5a45ed4358e73b8d87a5762d4f39f26dad4f0fed64de648b9a8a9c4a73b913
-
SHA512
ba2495187677a502ed9c87be75dc13f5841c44f8a9b32864665d89d875205001a1f5a59010d325ca5359b6f58a7b577d093b9f2a45f839fef8e248b09b036a78
-
SSDEEP
49152:WGlWC3YlQtHJ0VQ7VAG1FsmcsTKvA9OOG02Q:IQRv5A6
Malware Config
Signatures
-
Renames multiple (1817) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 1924 Zombie.exe 3840 _NisSrv.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe 2e5a45ed4358e73b8d87a5762d4f39f26dad4f0fed64de648b9a8a9c4a73b913.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 2e5a45ed4358e73b8d87a5762d4f39f26dad4f0fed64de648b9a8a9c4a73b913.exe -
resource yara_rule behavioral2/memory/4500-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x00090000000235a9-4.dat upx behavioral2/memory/1924-6-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x00070000000235b1-9.dat upx behavioral2/memory/4500-34-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\it\UIAutomationTypes.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ru\UIAutomationTypes.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\tr\System.Windows.Input.Manipulations.resources.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\ServiceWatcherSchedule.xml.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\it\Microsoft.VisualBasic.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\UIAutomationProvider.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pl\Microsoft.VisualBasic.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.IO.Compression.Native.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.Drawing.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\it\PresentationCore.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\es\PresentationUI.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\cs\System.Windows.Controls.Ribbon.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\PresentationFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pt-BR\PresentationFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.Security.Cryptography.Xml.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\fr\UIAutomationClient.resources.dll.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\et.txt.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\TabTip.exe.mui.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui.xml.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.fi-fi.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\it\ReachFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.Primitives.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Globalization.Calendars.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\tr\PresentationCore.resources.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\es-419.pak.tmp Zombie.exe File created C:\Program Files\BackupWatch.xsl.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVFileSystemMetadata.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.pl-pl.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hant\System.Xaml.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\es\ReachFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\BackupDeny.vsd.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOMessageProvider.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-heap-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-file-l1-2-0.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Xml.Serialization.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pt-BR\UIAutomationTypes.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.ComponentModel.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Xml.Serialization.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pl\PresentationUI.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\de\WindowsFormsIntegration.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pt-BR\System.Windows.Input.Manipulations.resources.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\ado\msado26.tlb.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\fr-FR\msdaremr.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\fr-FR\sqlxmlx.rll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\es\ReachFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pt-BR\UIAutomationProvider.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\host\fxr\7.0.16\hostfxr.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.UnmanagedMemoryStream.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Text.Encoding.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pl\UIAutomationTypes.resources.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsar.xml.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\tr\System.Windows.Controls.Ribbon.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hans\Microsoft.VisualBasic.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Security.Cryptography.X509Certificates.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\PresentationFramework.Classic.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Runtime.Loader.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\clrgc.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\it\System.Windows.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\7-Zip\7-zip32.dll.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\ko.txt.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\de-DE\tabskb.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\lv-LV\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\System\ado\fr-FR\msader15.dll.mui.tmp Zombie.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e5a45ed4358e73b8d87a5762d4f39f26dad4f0fed64de648b9a8a9c4a73b913.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4500 wrote to memory of 1924 4500 2e5a45ed4358e73b8d87a5762d4f39f26dad4f0fed64de648b9a8a9c4a73b913.exe 89 PID 4500 wrote to memory of 1924 4500 2e5a45ed4358e73b8d87a5762d4f39f26dad4f0fed64de648b9a8a9c4a73b913.exe 89 PID 4500 wrote to memory of 1924 4500 2e5a45ed4358e73b8d87a5762d4f39f26dad4f0fed64de648b9a8a9c4a73b913.exe 89 PID 4500 wrote to memory of 3840 4500 2e5a45ed4358e73b8d87a5762d4f39f26dad4f0fed64de648b9a8a9c4a73b913.exe 90 PID 4500 wrote to memory of 3840 4500 2e5a45ed4358e73b8d87a5762d4f39f26dad4f0fed64de648b9a8a9c4a73b913.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e5a45ed4358e73b8d87a5762d4f39f26dad4f0fed64de648b9a8a9c4a73b913.exe"C:\Users\Admin\AppData\Local\Temp\2e5a45ed4358e73b8d87a5762d4f39f26dad4f0fed64de648b9a8a9c4a73b913.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1924
-
-
C:\Users\Admin\AppData\Local\Temp\_NisSrv.exe"_NisSrv.exe"2⤵
- Executes dropped EXE
PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4348,i,1828333185976713750,7918646547767660928,262144 --variations-seed-version --mojo-platform-channel-handle=4052 /prefetch:81⤵PID:5112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5932e305ed60880bbaba2c693c000d34b
SHA17ba2f7f6e168dea8e48c9f013401227aec489fff
SHA256b2dd84294cae5b7134bb0e93be94a4a6cb572408a430649301b445110eab881b
SHA512253304e5e30c93469c3c2385990c8ae25f71802a8a62c482056de9629d47a997f2078bdf4321cba55a1a515278319e7bfb237952172f390931a84ec6615d8633
-
Filesize
2.4MB
MD54458b159176c71659a3ec035ebb78e28
SHA1b69502a41efb9c551c215bc366df4540b69ebea0
SHA256a81b3ece86010b4f4afd1ac1771a9e2469d04ac12b0c26c9068730a970a91ed4
SHA512007f99c372709de3fc5605c694cbaa92732d610e1ea4a00a2817861fb99de5352c50be5673fbc6991c565c252a0dd60710c65da7de0d39a31e1b871542053288
-
Filesize
33KB
MD548106bafa34064810531c7afbe6223c9
SHA113ec47e0b865311cf55a3d3a175b51884402a93b
SHA2562ffc6a05bea4f661ebd9d685281aa5b9f2f59dc283d36fc6363e04572a27eb22
SHA5126ee7bd0c06246399380675cbae78854878bf8430424c2029bfb6fc5a9c57d66900c78b83d78617b47cc6586253120d83b4c9b01c9e35634e996741b618f9d103