Analysis

  • max time kernel
    31s
  • max time network
    42s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2024, 19:32

Errors

Reason
Machine shutdown

General

  • Target

    92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe

  • Size

    202KB

  • MD5

    2304b0912aaddc69a275779cfcbae7fc

  • SHA1

    2f08f3f98181b5ec1f06f6fda82d60c88b4a3481

  • SHA256

    92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8

  • SHA512

    9a7938c9f5732d26318ae9114c272309dc516847bf84cc848e0d43a82dd328e36e77510dad22df0e0563ab23623108a3898161e2bb4066e5f4ceaeea964c75cc

  • SSDEEP

    3072:6e76ynluJR9B3NZWGCLOwstyhZFChcssc56FUrgxvbSD4UQrO2FR:ReynluP9ZNoShcHUar

Score
9/10

Malware Config

Signatures

  • Renames multiple (961) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe
    "C:\Users\Admin\AppData\Local\Temp\92f96fb27c1adfbfc8d7bc43795268957c9717c38200f9b3ea78818e6c7a30d8.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:984
    • C:\Users\Admin\AppData\Local\Temp\_cpack.exe
      "_cpack.exe"
      2⤵
      • Executes dropped EXE
      PID:4684

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2412658365-3084825385-3340777666-1000\desktop.ini.exe

          Filesize

          62KB

          MD5

          c2bdb63cc4fc4400e0f577a47618c338

          SHA1

          5137e6f5fd7c43f694823b77ea8f5d18724825ac

          SHA256

          d0c53a384e6015ceb2650b94458fd48f32e3620fca5a84a0e83dff9da28492e0

          SHA512

          0f3af86f4ec3d2f954b6f364b86609edbda33eac94839ff90f4d2a19ce5baa3b2394f9efa1e37bd9a452fc1b00b3823aaddfc215e1545aa8ae3417444fbbe28c

        • C:\Users\Admin\AppData\Local\Temp\_cpack.exe

          Filesize

          140KB

          MD5

          caad373422b474737f4d76fb82379581

          SHA1

          6804be1ae8bfd3858e0053915f75d4b611790bc5

          SHA256

          22c0d54e96431ebae4d40546f4efe6af61d1a9644710f93dc32ec2ca6cf2ba75

          SHA512

          dbaba0bc94aaeddb9811b0b9fd923f763ef8c7e290153e21e295230fdbe9c683dbf0b096eda3a3eb06e4ff9733cb3e9906737a1b5ee8e6af034680c198b95dd5

        • C:\Windows\SysWOW64\Zombie.exe

          Filesize

          62KB

          MD5

          5af944cf740d2192d144419d30762476

          SHA1

          363dd67cf6512196afed71bd203f28f14e10a69e

          SHA256

          d450ad7ccae673bd9f292caf4dc4b78d20b8a133036bb931cf5fa8d24e1163a5

          SHA512

          b29406b5c0125c408f600ef91079be3e0239397ba664227e139e44946f828c35485ea0af3a5423f84c0818e03bc698b4c9b0e3b5d303d86ad0e632d26264a148

        • memory/4684-19-0x0000000000060000-0x0000000000088000-memory.dmp

          Filesize

          160KB

        • memory/4684-20-0x00007FFABC2B3000-0x00007FFABC2B5000-memory.dmp

          Filesize

          8KB