Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
60s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 19:18
Behavioral task
behavioral1
Sample
7ace5670b060a9a389ec1977802c030130bd1d6ee7aa54c13c640e77e8aecf31.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7ace5670b060a9a389ec1977802c030130bd1d6ee7aa54c13c640e77e8aecf31.exe
Resource
win10v2004-20240802-en
General
-
Target
7ace5670b060a9a389ec1977802c030130bd1d6ee7aa54c13c640e77e8aecf31.exe
-
Size
607KB
-
MD5
31bc95a2577acda7a463b0727cc8e25b
-
SHA1
2169ea61f0f7f3e07ef1c249184caae15149b996
-
SHA256
7ace5670b060a9a389ec1977802c030130bd1d6ee7aa54c13c640e77e8aecf31
-
SHA512
8ec609f65ec901101619d8171bd10c56a2fad3fc22c459288eef4442340e8414b6ec86e2ff784d1c3c6f3f8d31e21718219567921518423e54611e5c7f1fcf23
-
SSDEEP
6144:KQSolf5uKhbSnHXBMV5jdCBjtsD52dmdLqff86+jVvaYMLOen9Bp1xf2ODuYMyRE:KQtlUVRMstsD5pAfujVvaYML59RIgq
Malware Config
Signatures
-
Renames multiple (555) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 2376 Zombie.exe 2312 _MpCmdRun.exe -
Loads dropped DLL 4 IoCs
pid Process 2104 7ace5670b060a9a389ec1977802c030130bd1d6ee7aa54c13c640e77e8aecf31.exe 2104 7ace5670b060a9a389ec1977802c030130bd1d6ee7aa54c13c640e77e8aecf31.exe 2104 7ace5670b060a9a389ec1977802c030130bd1d6ee7aa54c13c640e77e8aecf31.exe 2984 Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe 7ace5670b060a9a389ec1977802c030130bd1d6ee7aa54c13c640e77e8aecf31.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 7ace5670b060a9a389ec1977802c030130bd1d6ee7aa54c13c640e77e8aecf31.exe -
resource yara_rule behavioral1/memory/2104-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/files/0x00080000000120f4-7.dat upx behavioral1/memory/2376-14-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/files/0x0008000000015d81-20.dat upx behavioral1/memory/2104-25-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\System\Ole DB\en-US\msdasqlr.dll.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationLeft_ButtonGraphic.png.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsnld.xml.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\sonicsptransform.ax.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\ja.pak.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\InkObj.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\TipTsf.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\oskmenubase.xml.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwrdeush.dat.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\it-IT\msdaprsr.dll.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\es-ES\DVDMaker.exe.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToScenesBackground_PAL.wmv.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\photoedge_videoinset.png.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\ky.txt.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\db\NOTICE.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\fontmanager.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_ja.properties.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_es.jar.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsfin.xml.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Full\dotslightoverlay.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationUp_SelectionSubpicture.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\NavigationRight_ButtonGraphic.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\alt-rt.jar.tmp Zombie.exe File created C:\Program Files\7-Zip\7zCon.sfx.tmp Zombie.exe File created C:\Program Files\DVD Maker\audiodepthconverter.ax.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationRight_SelectionSubpicture.png.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\tabskb.dll.mui.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\uz.txt.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Sand_Paper.jpg.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\en.ttt.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\AccessBridgeCallbacks.h.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Dot.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationUp_SelectionSubpicture.png.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\SmallLogo.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_fr.jar.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Hand Prints.htm.tmp Zombie.exe File created C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\en-US\MSTTSLoc.dll.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyNotesBackground_PAL.wmv.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Notes_INTRO_BG.wmv.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\scenesscroll.png.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\InkWatson.exe.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Full\full.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\16_9-frame-highlight.png.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\sw.pak.tmp Zombie.exe File created C:\Program Files\Internet Explorer\F12.dll.tmp Zombie.exe File created C:\Program Files\Internet Explorer\IEShims.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\mlib_image.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\ado\msado25.tlb.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\content-types.properties.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\mr.txt.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\uk.txt.tmp Zombie.exe File created C:\Program Files\DVD Maker\es-ES\OmdProject.dll.mui.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\fa.pak.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\jfr.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\PYCC.pf.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\kaa.txt.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\msaddsr.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\msdasqlr.dll.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_travel_Thumbnail.bmp.tmp Zombie.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ace5670b060a9a389ec1977802c030130bd1d6ee7aa54c13c640e77e8aecf31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2376 2104 7ace5670b060a9a389ec1977802c030130bd1d6ee7aa54c13c640e77e8aecf31.exe 30 PID 2104 wrote to memory of 2376 2104 7ace5670b060a9a389ec1977802c030130bd1d6ee7aa54c13c640e77e8aecf31.exe 30 PID 2104 wrote to memory of 2376 2104 7ace5670b060a9a389ec1977802c030130bd1d6ee7aa54c13c640e77e8aecf31.exe 30 PID 2104 wrote to memory of 2376 2104 7ace5670b060a9a389ec1977802c030130bd1d6ee7aa54c13c640e77e8aecf31.exe 30 PID 2104 wrote to memory of 2312 2104 7ace5670b060a9a389ec1977802c030130bd1d6ee7aa54c13c640e77e8aecf31.exe 31 PID 2104 wrote to memory of 2312 2104 7ace5670b060a9a389ec1977802c030130bd1d6ee7aa54c13c640e77e8aecf31.exe 31 PID 2104 wrote to memory of 2312 2104 7ace5670b060a9a389ec1977802c030130bd1d6ee7aa54c13c640e77e8aecf31.exe 31 PID 2104 wrote to memory of 2312 2104 7ace5670b060a9a389ec1977802c030130bd1d6ee7aa54c13c640e77e8aecf31.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ace5670b060a9a389ec1977802c030130bd1d6ee7aa54c13c640e77e8aecf31.exe"C:\Users\Admin\AppData\Local\Temp\7ace5670b060a9a389ec1977802c030130bd1d6ee7aa54c13c640e77e8aecf31.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2376
-
-
C:\Users\Admin\AppData\Local\Temp\_MpCmdRun.exe"_MpCmdRun.exe"2⤵
- Executes dropped EXE
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD520bf194e46d02c52a0dcaf8fd22fabc9
SHA1076d40559cf01a30ace42c8342333e8845a0478a
SHA256e10de9bcdf950122155fae564b817cdbd8d34fc3f682c2b62d1fcd4b1708510e
SHA51293723ac392ee3fdbb10b3f189182351ce299157812ac9a8f56a305ff8dc1e0204335e0d2670079fc67c05d3337095ba4bc0bbf387d329a99b43c73f58152f867
-
Filesize
553KB
MD5d20b034be63c99803fb9b659d5e08c4f
SHA1cc6846f52e59a0c84a16fcadca34a8996630a0d2
SHA256ac9142ef4843eed75a010d6d31386f288757e9bffab9072eeb20c4a16ab5a26b
SHA512fdf53323a320e39b98c0a0b327437e96dd1d405025b93d8909cd3821dbdec0ef9bc1bec09a6471d31b3f7af07ce587aa450c7bc2da56ce7abfaa6a607bc2b168
-
Filesize
54KB
MD5f192d2312c7c07b14716990f9bfe659c
SHA1dc9c31f8cce47f85499c5e7612240cf6531fd8e7
SHA2560b7902476fe3271ace16be1d5f157d15c596b1dc4fb770ef1616d89a59576624
SHA512dc8141a04133946e7000e7e3d495bab9123af7ef543182d955f716494c12c5bda9c756e655e8767281aa4d7194e4879dbcfbb487cc1b9d4a128938e6aa28a7a0