Analysis

  • max time kernel
    60s
  • max time network
    33s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2024, 19:53

General

  • Target

    3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe

  • Size

    683KB

  • MD5

    302355223951058450ea23d85512b84d

  • SHA1

    6bc5d29f43d2e242d81492cc03976eb9f2b87eb0

  • SHA256

    3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c

  • SHA512

    4f83182f477f42ac35ba990d73a2ff2064e98a3b0352f2e5d735552294abe2e72f0793de8bcecd0521584a95a088caa8a96e798282283232d5e2130d219e03cd

  • SSDEEP

    12288:aeFID53KoNw+bCUKklI9ufQ2XqJmrsZq4ZiohfzFq69:aR95Nw+bJ3lI9uB/48Ub9

Score
9/10

Malware Config

Signatures

  • Renames multiple (1826) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe
    "C:\Users\Admin\AppData\Local\Temp\3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3212
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:2228
    • C:\Users\Admin\AppData\Local\Temp\_mpextms.exe
      "_mpextms.exe"
      2⤵
      • Executes dropped EXE
      PID:436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.exe

    Filesize

    85KB

    MD5

    644cac569f4720a497ccf928f3bf3811

    SHA1

    501f513cd1d86ac6f9e71fc6dfa1a7ad85063d01

    SHA256

    24c057edb5b6854d44ff663518340168de3ad74ddb380a93dc042ff6cc6f98f8

    SHA512

    da15770540e9ce42ae77a1f50a4068453f85886a8df226bc02f72118e384eb8260ffca1bab300f8425b5285a918cceaaee876107a7589b98927118537ca33dcc

  • C:\Users\Admin\AppData\Local\Temp\_mpextms.exe

    Filesize

    597KB

    MD5

    69fec6fed212a3a310230606f4d4e9ce

    SHA1

    89573c0cd4933e59a0e49679246b96b34dd51b44

    SHA256

    6ab14e409d9d4910971d7edf973b5c25a269b50bdfc504754a127ff12e3ade8b

    SHA512

    964d9278a1b94792f73eb6bd8700dcc58d3a32153554390eb6f32b3525e63243905ffdeed6268b28690148e33d29fcd00fb39209580ad89581655acbad0d1497

  • C:\Windows\SysWOW64\Zombie.exe

    Filesize

    85KB

    MD5

    ea015368d1dfdde0c74b4ef357d3dfc6

    SHA1

    9282a760216771da308fd4c994f43bc9309d50bc

    SHA256

    40f36c9ccd5d60276b8bc1228e0c005b5913de2ae8d905b6cf554d98b82d0673

    SHA512

    df662de23683b0e9bf6ec1f324f2b7da51158751b92a59a7dff4ab5b03ae7ad88f1c217b8376717e630df841ab922701c94fbe9939e8fc66daf46a49ba4ccea2