Analysis

  • max time kernel
    59s
  • max time network
    34s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2024, 19:28

General

  • Target

    92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe

  • Size

    202KB

  • MD5

    2304b0912aaddc69a275779cfcbae7fc

  • SHA1

    2f08f3f98181b5ec1f06f6fda82d60c88b4a3481

  • SHA256

    92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8

  • SHA512

    9a7938c9f5732d26318ae9114c272309dc516847bf84cc848e0d43a82dd328e36e77510dad22df0e0563ab23623108a3898161e2bb4066e5f4ceaeea964c75cc

  • SSDEEP

    3072:6e76ynluJR9B3NZWGCLOwstyhZFChcssc56FUrgxvbSD4UQrO2FR:ReynluP9ZNoShcHUar

Score
9/10

Malware Config

Signatures

  • Renames multiple (1829) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe
    "C:\Users\Admin\AppData\Local\Temp\92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4456
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:5040
    • C:\Users\Admin\AppData\Local\Temp\_cpack.exe
      "_cpack.exe"
      2⤵
      • Executes dropped EXE
      PID:2784

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.exe

          Filesize

          62KB

          MD5

          45c36dc95d84d0250a4d19c1d76b981e

          SHA1

          2c77854577cda1248348bdb4c81a7ddbb0ea9d7d

          SHA256

          f095974e9cdc4daebca299160de3d18b23662a99ce7ab410e3ad55c4b72da1fc

          SHA512

          e01540aab9b74cdd0dc1d52e852fd74557a5388b4c6acefdc5bf378576f97d1f5836596efa42fa7cbd1bfa63e567dd03e6b01fdc6c77049f6d180039158d58cc

        • C:\Users\Admin\AppData\Local\Temp\_cpack.exe

          Filesize

          140KB

          MD5

          caad373422b474737f4d76fb82379581

          SHA1

          6804be1ae8bfd3858e0053915f75d4b611790bc5

          SHA256

          22c0d54e96431ebae4d40546f4efe6af61d1a9644710f93dc32ec2ca6cf2ba75

          SHA512

          dbaba0bc94aaeddb9811b0b9fd923f763ef8c7e290153e21e295230fdbe9c683dbf0b096eda3a3eb06e4ff9733cb3e9906737a1b5ee8e6af034680c198b95dd5

        • C:\Windows\SysWOW64\Zombie.exe

          Filesize

          62KB

          MD5

          5af944cf740d2192d144419d30762476

          SHA1

          363dd67cf6512196afed71bd203f28f14e10a69e

          SHA256

          d450ad7ccae673bd9f292caf4dc4b78d20b8a133036bb931cf5fa8d24e1163a5

          SHA512

          b29406b5c0125c408f600ef91079be3e0239397ba664227e139e44946f828c35485ea0af3a5423f84c0818e03bc698b4c9b0e3b5d303d86ad0e632d26264a148

        • memory/2784-19-0x0000000000650000-0x0000000000678000-memory.dmp

          Filesize

          160KB

        • memory/2784-20-0x00007FFC36753000-0x00007FFC36755000-memory.dmp

          Filesize

          8KB