Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 19:32

General

  • Target

    92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe

  • Size

    202KB

  • MD5

    2304b0912aaddc69a275779cfcbae7fc

  • SHA1

    2f08f3f98181b5ec1f06f6fda82d60c88b4a3481

  • SHA256

    92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8

  • SHA512

    9a7938c9f5732d26318ae9114c272309dc516847bf84cc848e0d43a82dd328e36e77510dad22df0e0563ab23623108a3898161e2bb4066e5f4ceaeea964c75cc

  • SSDEEP

    3072:6e76ynluJR9B3NZWGCLOwstyhZFChcssc56FUrgxvbSD4UQrO2FR:ReynluP9ZNoShcHUar

Score
9/10

Malware Config

Signatures

  • Renames multiple (3748) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe
    "C:\Users\Admin\AppData\Local\Temp\92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:2156
    • C:\Users\Admin\AppData\Local\Temp\_cpack.exe
      "_cpack.exe"
      2⤵
      • Executes dropped EXE
      PID:2196

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

          Filesize

          62KB

          MD5

          943bc1b052463e3cc4e2214f90e4211a

          SHA1

          bd7c2ec926d39f51beb3a82d353a3bfb513f2ae2

          SHA256

          af44ce5c42d1728342fb417c1e2307677b3b857fea2929606ecadb53f11ead8d

          SHA512

          c888deae1d042b892d2ef201b9b40861ca84fe25417b3da44b5e603e1893fc3dc304e1da4855c07bd0e8f785579a8919f3160558e1c86fed81b26e4595a3f2b4

        • \Users\Admin\AppData\Local\Temp\_cpack.exe

          Filesize

          140KB

          MD5

          caad373422b474737f4d76fb82379581

          SHA1

          6804be1ae8bfd3858e0053915f75d4b611790bc5

          SHA256

          22c0d54e96431ebae4d40546f4efe6af61d1a9644710f93dc32ec2ca6cf2ba75

          SHA512

          dbaba0bc94aaeddb9811b0b9fd923f763ef8c7e290153e21e295230fdbe9c683dbf0b096eda3a3eb06e4ff9733cb3e9906737a1b5ee8e6af034680c198b95dd5

        • \Windows\SysWOW64\Zombie.exe

          Filesize

          62KB

          MD5

          5af944cf740d2192d144419d30762476

          SHA1

          363dd67cf6512196afed71bd203f28f14e10a69e

          SHA256

          d450ad7ccae673bd9f292caf4dc4b78d20b8a133036bb931cf5fa8d24e1163a5

          SHA512

          b29406b5c0125c408f600ef91079be3e0239397ba664227e139e44946f828c35485ea0af3a5423f84c0818e03bc698b4c9b0e3b5d303d86ad0e632d26264a148

        • memory/2196-19-0x000007FEF5E53000-0x000007FEF5E54000-memory.dmp

          Filesize

          4KB

        • memory/2196-20-0x00000000011F0000-0x0000000001218000-memory.dmp

          Filesize

          160KB