Analysis
-
max time kernel
59s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 19:28
Static task
static1
Behavioral task
behavioral1
Sample
92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe
Resource
win10v2004-20240802-en
General
-
Target
92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe
-
Size
202KB
-
MD5
2304b0912aaddc69a275779cfcbae7fc
-
SHA1
2f08f3f98181b5ec1f06f6fda82d60c88b4a3481
-
SHA256
92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8
-
SHA512
9a7938c9f5732d26318ae9114c272309dc516847bf84cc848e0d43a82dd328e36e77510dad22df0e0563ab23623108a3898161e2bb4066e5f4ceaeea964c75cc
-
SSDEEP
3072:6e76ynluJR9B3NZWGCLOwstyhZFChcssc56FUrgxvbSD4UQrO2FR:ReynluP9ZNoShcHUar
Malware Config
Signatures
-
Renames multiple (1829) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 5040 Zombie.exe 2784 _cpack.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe 92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.Resources.Extensions.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\it\UIAutomationProvider.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ko\PresentationCore.resources.dll.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\cy.txt.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RUI.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\de-DE\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Reflection.TypeExtensions.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ko\PresentationCore.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\it\WindowsFormsIntegration.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\System.Windows.Input.Manipulations.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pl\WindowsFormsIntegration.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Threading.Thread.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\Microsoft.VisualBasic.Forms.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.pt-br.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Memory.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Resources.Writer.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\tr\System.Windows.Input.Manipulations.resources.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipskor.xml.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\WindowsBase.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\UIAutomationClient.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\msvcp120.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\System.Windows.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ja\System.Windows.Controls.Ribbon.resources.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\ru.pak.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.IO.UnmanagedMemoryStream.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\UIAutomationProvider.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ru\WindowsBase.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\PresentationFramework.Aero.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\de\System.Windows.Forms.Design.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\PresentationFramework.AeroLite.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\et.pak.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.es-es.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Private.Uri.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ko\WindowsBase.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\System.Windows.Forms.Design.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pt-BR\PresentationUI.resources.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipssrl.xml.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\System.Windows.Controls.Ribbon.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\System.Windows.Presentation.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RHeartbeatConfig.xml.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.hu-hu.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Text.Encoding.Extensions.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\ado\msado28.tlb.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.Printing.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pl\PresentationCore.resources.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\ado\msader15.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Threading.Tasks.Extensions.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Xml.XmlDocument.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\fr\System.Windows.Forms.Design.resources.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\gu.pak.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\msvcr120.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Text.Encoding.CodePages.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Threading.Timer.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\Microsoft.VisualBasic.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\PresentationFramework.Aero2.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Collections.Concurrent.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Text.Encoding.Extensions.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.IO.FileSystem.AccessControl.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pl\System.Windows.Forms.Primitives.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ko\ReachFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Security.Cryptography.Encoding.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\cs\PresentationFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\UIAutomationTypes.resources.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome.dll.sig.tmp Zombie.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4456 wrote to memory of 5040 4456 92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe 82 PID 4456 wrote to memory of 5040 4456 92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe 82 PID 4456 wrote to memory of 5040 4456 92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe 82 PID 4456 wrote to memory of 2784 4456 92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe 83 PID 4456 wrote to memory of 2784 4456 92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe"C:\Users\Admin\AppData\Local\Temp\92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\_cpack.exe"_cpack.exe"2⤵
- Executes dropped EXE
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD545c36dc95d84d0250a4d19c1d76b981e
SHA12c77854577cda1248348bdb4c81a7ddbb0ea9d7d
SHA256f095974e9cdc4daebca299160de3d18b23662a99ce7ab410e3ad55c4b72da1fc
SHA512e01540aab9b74cdd0dc1d52e852fd74557a5388b4c6acefdc5bf378576f97d1f5836596efa42fa7cbd1bfa63e567dd03e6b01fdc6c77049f6d180039158d58cc
-
Filesize
140KB
MD5caad373422b474737f4d76fb82379581
SHA16804be1ae8bfd3858e0053915f75d4b611790bc5
SHA25622c0d54e96431ebae4d40546f4efe6af61d1a9644710f93dc32ec2ca6cf2ba75
SHA512dbaba0bc94aaeddb9811b0b9fd923f763ef8c7e290153e21e295230fdbe9c683dbf0b096eda3a3eb06e4ff9733cb3e9906737a1b5ee8e6af034680c198b95dd5
-
Filesize
62KB
MD55af944cf740d2192d144419d30762476
SHA1363dd67cf6512196afed71bd203f28f14e10a69e
SHA256d450ad7ccae673bd9f292caf4dc4b78d20b8a133036bb931cf5fa8d24e1163a5
SHA512b29406b5c0125c408f600ef91079be3e0239397ba664227e139e44946f828c35485ea0af3a5423f84c0818e03bc698b4c9b0e3b5d303d86ad0e632d26264a148