Analysis
-
max time kernel
59s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 19:28
Static task
static1
Behavioral task
behavioral1
Sample
92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe
Resource
win10v2004-20240802-en
General
-
Target
92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe
-
Size
202KB
-
MD5
2304b0912aaddc69a275779cfcbae7fc
-
SHA1
2f08f3f98181b5ec1f06f6fda82d60c88b4a3481
-
SHA256
92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8
-
SHA512
9a7938c9f5732d26318ae9114c272309dc516847bf84cc848e0d43a82dd328e36e77510dad22df0e0563ab23623108a3898161e2bb4066e5f4ceaeea964c75cc
-
SSDEEP
3072:6e76ynluJR9B3NZWGCLOwstyhZFChcssc56FUrgxvbSD4UQrO2FR:ReynluP9ZNoShcHUar
Malware Config
Signatures
-
Renames multiple (520) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 2352 Zombie.exe 2632 _cpack.exe -
Loads dropped DLL 3 IoCs
pid Process 2976 92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe 2976 92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe 2976 92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe 92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\jpeg.dll.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\lij.txt.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\ShapeCollector.exe.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\TipTsf.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\System\ado\msadomd28.tlb.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Postage_ButtonGraphic.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationRight_SelectionSubpicture.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\msvcr100.dll.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\FlickLearningWizard.exe.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\FlickLearningWizard.exe.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Memo.emf.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_MATTE_PAL.wmv.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\PreviousMenuButtonIcon.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationLeft_SelectionSubpicture.png.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwrdeush.dat.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Scenes_LOOP_BG_PAL.wmv.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationLeft_SelectionSubpicture.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationRight_SelectionSubpicture.png.tmp Zombie.exe File created C:\Program Files\Common Files\Services\verisign.bmp.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\ja-JP\msaddsr.dll.mui.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\SmallLogoCanary.png.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\bn.txt.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\InputPersonalization.exe.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationLeft_ButtonGraphic.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\whitemenu.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\directshowtap.ax.tmp Zombie.exe File created C:\Program Files\DVD Maker\fr-FR\OmdProject.dll.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainBackground.wmv.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\mojo_core.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\jsound.dll.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsjpn.xml.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\System\ado\msader15.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\msdaremr.dll.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\button-highlight.png.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\ro.pak.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\jfxmedia.dll.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\TipRes.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\msinfo32.exe.mui.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\fr-FR\msadcer.dll.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationRight_SelectionSubpicture.png.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\chrome_proxy.exe.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\deploy.dll.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\mshwLatin.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hwresmlm.dat.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\mshwLatin.dll.tmp Zombie.exe File created C:\Program Files\CompressApprove.wdp.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_VideoInset.png.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\ja.pak.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\mn.txt.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\InkWatson.exe.mui.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\es-ES\msadcfr.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\sqloledb.rll.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\specialoccasion.png.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\co.txt.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsptg.xml.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationUp_ButtonGraphic.png.tmp Zombie.exe File created C:\Program Files\Internet Explorer\en-US\networkinspection.dll.mui.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_ko_KR.jar.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\de.pak.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\adcjavas.inc.tmp Zombie.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2352 2976 92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe 30 PID 2976 wrote to memory of 2352 2976 92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe 30 PID 2976 wrote to memory of 2352 2976 92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe 30 PID 2976 wrote to memory of 2352 2976 92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe 30 PID 2976 wrote to memory of 2632 2976 92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe 31 PID 2976 wrote to memory of 2632 2976 92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe 31 PID 2976 wrote to memory of 2632 2976 92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe 31 PID 2976 wrote to memory of 2632 2976 92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe"C:\Users\Admin\AppData\Local\Temp\92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2352
-
-
C:\Users\Admin\AppData\Local\Temp\_cpack.exe"_cpack.exe"2⤵
- Executes dropped EXE
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD59b9bb6cbf171f85a72e240ac86c821dc
SHA1f0d4fa8695a44a5243b5b7868585aacf0086301e
SHA256a60fa6fe78f414b941ffe41d12ef38d12eae2b4d4174c02e064659df39252a6a
SHA5125d191c6c6867b8c1a8e46f4ef7fde2a5b6801c39e2324d6dcaabef79845f075ca1a8eca2c0f77c98a34a6dbbed27d906b5711b135e4f095873f039cfa6154407
-
Filesize
140KB
MD5caad373422b474737f4d76fb82379581
SHA16804be1ae8bfd3858e0053915f75d4b611790bc5
SHA25622c0d54e96431ebae4d40546f4efe6af61d1a9644710f93dc32ec2ca6cf2ba75
SHA512dbaba0bc94aaeddb9811b0b9fd923f763ef8c7e290153e21e295230fdbe9c683dbf0b096eda3a3eb06e4ff9733cb3e9906737a1b5ee8e6af034680c198b95dd5
-
Filesize
62KB
MD55af944cf740d2192d144419d30762476
SHA1363dd67cf6512196afed71bd203f28f14e10a69e
SHA256d450ad7ccae673bd9f292caf4dc4b78d20b8a133036bb931cf5fa8d24e1163a5
SHA512b29406b5c0125c408f600ef91079be3e0239397ba664227e139e44946f828c35485ea0af3a5423f84c0818e03bc698b4c9b0e3b5d303d86ad0e632d26264a148