Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
59s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 19:53
Static task
static1
Behavioral task
behavioral1
Sample
3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe
Resource
win10v2004-20240802-en
General
-
Target
3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe
-
Size
683KB
-
MD5
302355223951058450ea23d85512b84d
-
SHA1
6bc5d29f43d2e242d81492cc03976eb9f2b87eb0
-
SHA256
3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c
-
SHA512
4f83182f477f42ac35ba990d73a2ff2064e98a3b0352f2e5d735552294abe2e72f0793de8bcecd0521584a95a088caa8a96e798282283232d5e2130d219e03cd
-
SSDEEP
12288:aeFID53KoNw+bCUKklI9ufQ2XqJmrsZq4ZiohfzFq69:aR95Nw+bJ3lI9uB/48Ub9
Malware Config
Signatures
-
Renames multiple (600) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 2292 Zombie.exe 3048 _mpextms.exe -
Loads dropped DLL 2 IoCs
pid Process 1416 3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe 1416 3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe 3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\default.jfc.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\ps.txt.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\msadcf.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\en-US\msdasqlr.dll.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\NavigationUp_ButtonGraphic.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\db\3RDPARTY.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\java_crw_demo.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_fr.properties.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\pa-in.txt.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\VGX\VGX.dll.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\button-highlight.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\content-foreground.png.tmp Zombie.exe File created C:\Program Files\Internet Explorer\ieinstal.exe.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\content-types.properties.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\it.txt.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad.xml.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\oskmenubase.xml.tmp Zombie.exe File created C:\Program Files\Common Files\System\ado\fr-FR\msader15.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\msadds.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\el.pak.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\LucidaTypewriterBold.ttf.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\zh-tw.txt.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\SoftBlue.jpg.tmp Zombie.exe File created C:\Program Files\Common Files\Services\verisign.bmp.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\de-DE\sqloledb.rll.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\es-ES\DVDMaker.exe.mui.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\AccessBridgeCalls.c.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base.xml.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsdeu.xml.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\OFFICE14\msoshext.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\fr-FR\oledb32r.dll.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\ja-JP\DVDMaker.exe.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_uparrow.png.tmp Zombie.exe File created C:\Program Files\Internet Explorer\en-US\F12.dll.mui.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\es.txt.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\yo.txt.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsdan.xml.tmp Zombie.exe File created C:\Program Files\Common Files\System\ado\msader15.dll.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\1047x576black.png.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\cs.pak.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\InkDiv.dll.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Monet.jpg.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\te.pak.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Push\1047_576black.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\deploy.dll.tmp Zombie.exe File created C:\Program Files\7-Zip\7zCon.sfx.tmp Zombie.exe File created C:\Program Files\DVD Maker\fr-FR\WMM2CLIP.dll.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\heart_glass_Thumbnail.bmp.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\NextMenuButtonIcon.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationUp_SelectionSubpicture.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\button-bullet.png.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\tg.txt.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\va.txt.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\dicjp.dll.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_frame-highlight.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationUp_SelectionSubpicture.png.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\id.pak.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Title_Page_PAL.wmv.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_travel_Thumbnail.bmp.tmp Zombie.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1416 wrote to memory of 2292 1416 3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe 31 PID 1416 wrote to memory of 2292 1416 3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe 31 PID 1416 wrote to memory of 2292 1416 3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe 31 PID 1416 wrote to memory of 2292 1416 3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe"C:\Users\Admin\AppData\Local\Temp\3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\_mpextms.exe"_mpextms.exe"2⤵
- Executes dropped EXE
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD547df83b34e42f95435c7580b7dd00f9d
SHA1a76c9c932b9445292a1ca944691401e63a1feae7
SHA2560a412e5f362c963e7f2ed1309050974c1a70f34ab99fc55a6373102d12b1f7bf
SHA5128485c38a7ca53c89aaa5b88049e6c568e72ecfb8c1db9d70226919758ecab56d68cfbf6587e8e6e006f9ef3217aecbaf6c34d9cac99872c9a0c5d0c04ba3a342
-
Filesize
597KB
MD569fec6fed212a3a310230606f4d4e9ce
SHA189573c0cd4933e59a0e49679246b96b34dd51b44
SHA2566ab14e409d9d4910971d7edf973b5c25a269b50bdfc504754a127ff12e3ade8b
SHA512964d9278a1b94792f73eb6bd8700dcc58d3a32153554390eb6f32b3525e63243905ffdeed6268b28690148e33d29fcd00fb39209580ad89581655acbad0d1497
-
Filesize
85KB
MD5ea015368d1dfdde0c74b4ef357d3dfc6
SHA19282a760216771da308fd4c994f43bc9309d50bc
SHA25640f36c9ccd5d60276b8bc1228e0c005b5913de2ae8d905b6cf554d98b82d0673
SHA512df662de23683b0e9bf6ec1f324f2b7da51158751b92a59a7dff4ab5b03ae7ad88f1c217b8376717e630df841ab922701c94fbe9939e8fc66daf46a49ba4ccea2