Analysis
-
max time kernel
60s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 19:53
Static task
static1
Behavioral task
behavioral1
Sample
3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe
Resource
win10v2004-20240802-en
General
-
Target
3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe
-
Size
683KB
-
MD5
302355223951058450ea23d85512b84d
-
SHA1
6bc5d29f43d2e242d81492cc03976eb9f2b87eb0
-
SHA256
3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c
-
SHA512
4f83182f477f42ac35ba990d73a2ff2064e98a3b0352f2e5d735552294abe2e72f0793de8bcecd0521584a95a088caa8a96e798282283232d5e2130d219e03cd
-
SSDEEP
12288:aeFID53KoNw+bCUKklI9ufQ2XqJmrsZq4ZiohfzFq69:aR95Nw+bJ3lI9uB/48Ub9
Malware Config
Signatures
-
Renames multiple (1826) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 2228 Zombie.exe 436 _mpextms.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe 3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\Microsoft.WindowsDesktop.App.runtimeconfig.json.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\System.Security.Permissions.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\uk.pak.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\.version.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\ko-KR\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\msadds.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.ComponentModel.Annotations.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hant\WindowsBase.resources.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\ro.pak.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\rtscom.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Console.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Xml.Serialization.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Configuration.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\de\System.Windows.Input.Manipulations.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\System.Windows.Forms.Design.Editors.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\fr-FR\msadcor.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\it-IT\msdaprsr.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hant\System.Windows.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\concrt140.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\cs\System.Windows.Forms.Design.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.Configuration.ConfigurationManager.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\Microsoft.WindowsDesktop.App.deps.json.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\es\System.Windows.Forms.Design.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\tr\System.Windows.Forms.Design.resources.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOMessageProvider.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\PresentationFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ru\UIAutomationTypes.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pl\System.Windows.Forms.Primitives.resources.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\eventlog_provider.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Globalization.Extensions.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Web.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Net.WebProxy.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\System.Threading.AccessControl.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.Mail.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Windows.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIsvApi.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\vstoee100.tlb.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_jpn.xml.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\mshwgst.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.Resources.Extensions.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\tr\System.Windows.Input.Manipulations.resources.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\oskclearuibase.xml.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\ReachFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.Windows.Forms.Design.Editors.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\cs\UIAutomationClientSideProviders.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Runtime.Serialization.Formatters.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\fr\ReachFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Core.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Diagnostics.Process.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.IO.FileSystem.Primitives.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\DirectWriteForwarder.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hans\ReachFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\it-IT\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Xml.XPath.XDocument.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Runtime.Intrinsics.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\cs\UIAutomationClient.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-console-l1-2-0.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Private.Xml.Linq.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\PresentationFramework-SystemXmlLinq.dll.tmp Zombie.exe File created C:\Program Files\Crashpad\settings.dat.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\it-IT\mshwLatin.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\msadce.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Runtime.InteropServices.JavaScript.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.Windows.Forms.dll.tmp Zombie.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3212 wrote to memory of 2228 3212 3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe 82 PID 3212 wrote to memory of 2228 3212 3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe 82 PID 3212 wrote to memory of 2228 3212 3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe 82 PID 3212 wrote to memory of 436 3212 3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe 83 PID 3212 wrote to memory of 436 3212 3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe"C:\Users\Admin\AppData\Local\Temp\3dbd1ca6f8047c98e622e357813b9f2b76f606703ab0da2524a432d905df7b9c.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2228
-
-
C:\Users\Admin\AppData\Local\Temp\_mpextms.exe"_mpextms.exe"2⤵
- Executes dropped EXE
PID:436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD5644cac569f4720a497ccf928f3bf3811
SHA1501f513cd1d86ac6f9e71fc6dfa1a7ad85063d01
SHA25624c057edb5b6854d44ff663518340168de3ad74ddb380a93dc042ff6cc6f98f8
SHA512da15770540e9ce42ae77a1f50a4068453f85886a8df226bc02f72118e384eb8260ffca1bab300f8425b5285a918cceaaee876107a7589b98927118537ca33dcc
-
Filesize
597KB
MD569fec6fed212a3a310230606f4d4e9ce
SHA189573c0cd4933e59a0e49679246b96b34dd51b44
SHA2566ab14e409d9d4910971d7edf973b5c25a269b50bdfc504754a127ff12e3ade8b
SHA512964d9278a1b94792f73eb6bd8700dcc58d3a32153554390eb6f32b3525e63243905ffdeed6268b28690148e33d29fcd00fb39209580ad89581655acbad0d1497
-
Filesize
85KB
MD5ea015368d1dfdde0c74b4ef357d3dfc6
SHA19282a760216771da308fd4c994f43bc9309d50bc
SHA25640f36c9ccd5d60276b8bc1228e0c005b5913de2ae8d905b6cf554d98b82d0673
SHA512df662de23683b0e9bf6ec1f324f2b7da51158751b92a59a7dff4ab5b03ae7ad88f1c217b8376717e630df841ab922701c94fbe9939e8fc66daf46a49ba4ccea2