Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 08:47
Behavioral task
behavioral1
Sample
23c2f705711b17b19b5759a3e5d4153b8f5eb856195fc54a1caab74f596eaf0cN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
23c2f705711b17b19b5759a3e5d4153b8f5eb856195fc54a1caab74f596eaf0cN.exe
Resource
win10v2004-20241007-en
General
-
Target
23c2f705711b17b19b5759a3e5d4153b8f5eb856195fc54a1caab74f596eaf0cN.exe
-
Size
525KB
-
MD5
ce65881ed7d49dc88b9a8aabf3846a80
-
SHA1
2d24120fa547e4808058c19bcbed60627e90cf5a
-
SHA256
23c2f705711b17b19b5759a3e5d4153b8f5eb856195fc54a1caab74f596eaf0c
-
SHA512
d8e5898114c3319662f788ff2143f1a5ca36a6b82ca643e342f5e42ef803ddd8237a7c3efd03683f771562d9d84a0445f4fae7eca7a15c5a3e184e8d7759a899
-
SSDEEP
6144:KWRt+eH9BpoxJI3ANJuBN0PDGxWSqqcfrj8XzL/3upuqs8j8IvwvWGEuTt3n8/yR:HRtEZNJuzVrcX8GW8j5veWpuTtMf8
Malware Config
Signatures
-
Renames multiple (4651) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 3592 Zombie.exe 3304 _MpCmdRun.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe 23c2f705711b17b19b5759a3e5d4153b8f5eb856195fc54a1caab74f596eaf0cN.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 23c2f705711b17b19b5759a3e5d4153b8f5eb856195fc54a1caab74f596eaf0cN.exe -
resource yara_rule behavioral2/memory/848-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x000c000000023ba8-4.dat upx behavioral2/files/0x0008000000023c8a-10.dat upx behavioral2/memory/848-22-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-locale-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\PresentationCore.resources.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\nb.pak.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogo.contrast-white_scale-100.png.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest4-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.SqlServer.Configuration.SString.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\ar-SA\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Reflection.DispatchProxy.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\PresentationCore.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_Trial-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-conio-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pt-BR\System.Windows.Forms.Primitives.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019R_OEM_Perp-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\JitV.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\POWERPNT_K_COL.HXK.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\EntityPicker.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\it\System.Windows.Controls.Ribbon.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\System.Security.Cryptography.ProtectedData.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\flavormap.properties.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\fonts\LucidaBrightDemiItalic.ttf.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.AnalysisServices.Layout.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.ReportingServices.Interfaces.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MSO0127.ACL.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\deploy\messages.properties.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PersonalR_OEM_Perp-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp4-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\STSLIST.CHM.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\SETLANG_COL.HXC.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hant\UIAutomationClientSideProviders.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\j2pkcs11.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\unlimited\local_policy.jar.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessR_Trial-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription2-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\EduWorks Data Streamer Add-In\MicrosoftDataStreamerforExcel.dll.manifest.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Threading.Tasks.Dataflow.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ru\WindowsBase.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\PresentationFramework.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.pl-pl.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\cs\UIAutomationClientSideProviders.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\ext\sunjce_provider.jar.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\server\jvm.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Text.Encoding.Extensions.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hans\PresentationCore.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OutlookR_Trial-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\w2k_lsa_auth.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Green.xml.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\de-DE\msdasqlr.dll.mui.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MSWORD.OLB.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_OEM_Perp-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Diagnostics.StackTrace.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\it\System.Windows.Input.Manipulations.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\limited\local_policy.jar.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-handle-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\javafx_font.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\fonts\LucidaTypewriterBold.ttf.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019VL_KMS_Client_AE-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.Excel.ReportingServices.QueryDesigners.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\fr-FR\sqloledb.rll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pt-BR\System.Windows.Controls.Ribbon.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\Microsoft.WindowsDesktop.App.runtimeconfig.json.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Excel2019VL_MAK_AE-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PersonalPipcR_OEM_Perp-ul-oob.xrm-ms.tmp Zombie.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23c2f705711b17b19b5759a3e5d4153b8f5eb856195fc54a1caab74f596eaf0cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 848 wrote to memory of 3592 848 23c2f705711b17b19b5759a3e5d4153b8f5eb856195fc54a1caab74f596eaf0cN.exe 84 PID 848 wrote to memory of 3592 848 23c2f705711b17b19b5759a3e5d4153b8f5eb856195fc54a1caab74f596eaf0cN.exe 84 PID 848 wrote to memory of 3592 848 23c2f705711b17b19b5759a3e5d4153b8f5eb856195fc54a1caab74f596eaf0cN.exe 84 PID 848 wrote to memory of 3304 848 23c2f705711b17b19b5759a3e5d4153b8f5eb856195fc54a1caab74f596eaf0cN.exe 85 PID 848 wrote to memory of 3304 848 23c2f705711b17b19b5759a3e5d4153b8f5eb856195fc54a1caab74f596eaf0cN.exe 85 PID 848 wrote to memory of 3304 848 23c2f705711b17b19b5759a3e5d4153b8f5eb856195fc54a1caab74f596eaf0cN.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\23c2f705711b17b19b5759a3e5d4153b8f5eb856195fc54a1caab74f596eaf0cN.exe"C:\Users\Admin\AppData\Local\Temp\23c2f705711b17b19b5759a3e5d4153b8f5eb856195fc54a1caab74f596eaf0cN.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3592
-
-
C:\Users\Admin\AppData\Local\Temp\_MpCmdRun.exe"_MpCmdRun.exe"2⤵
- Executes dropped EXE
PID:3304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD5c0e74dfd14309a64d22c1d620d5e09b4
SHA140b4679dabdc3544a4d48a50e61541704d866851
SHA25605c1d8d56a58bf9e1ad4bd3bf0b86aca6cf8446785da6a5d5d38b541e0877d2b
SHA512f4f7e7fa4021cf1732c87d63df495e9dd4c6edda15f6c565b8031b8ace615c63960a26e9ac0017d196d30c4555e96938d83ba63e1445548451a71445f9fe7164
-
Filesize
456KB
MD5e08445b7cddf167e3d70734dddcecbc0
SHA149de5e5dcc5750d841767e537b0fca72b39a159c
SHA2564e25c4181f8b30517eeebd36982c46364f8f1ffa60bce1d0b5bc8df459e71355
SHA5124c761fa4a8b013a972095356b9f1aa45f3f6e738cb3c0c8b06d2fc38eb0f8e42cb5840dd33193c0048a7a628db98324706ce5f58d5227707251d48416465ed07
-
Filesize
68KB
MD5fe167822bd148aaf800fa4b74a350a82
SHA1a9f9a19f9773a7572b11f1cd6197c31df093318a
SHA256c980cb563ce863dc6e6ce667eb55811cd23fe7a2c0e34e400cb00631cb9f714e
SHA512040d75b8ae9c0b1c1b96ee3db756cf5b8aa56d3bcb7849d93ee44865b5355448631c3d933e58147743914e23093997de54c0614104fcd5aebcc96dfe8b921b23