Analysis

  • max time kernel
    120s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-10-2024 18:38

General

  • Target

    4f6d5965280ed4995ec5806e0658f08388194fd12a8848c0b9f70034143c2cb7N.exe

  • Size

    132KB

  • MD5

    7e3b497e8f252e10b9d4da2a6e939d30

  • SHA1

    f79ad35889f8cc176009ec0d6320f9bedac8e737

  • SHA256

    4f6d5965280ed4995ec5806e0658f08388194fd12a8848c0b9f70034143c2cb7

  • SHA512

    c1712765445548eefb2528b193dc79816ef0134a51780d73137b2288a7c6fe73297128b10e893d57d94b81a40522af3e92ee937da5b31df06fb91651a395de3d

  • SSDEEP

    3072:6pWpBwchcwDqqupWpBwchcwDqqOpWpBwchcwDqqu:PPfK

Score
9/10

Malware Config

Signatures

  • Renames multiple (4624) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f6d5965280ed4995ec5806e0658f08388194fd12a8848c0b9f70034143c2cb7N.exe
    "C:\Users\Admin\AppData\Local\Temp\4f6d5965280ed4995ec5806e0658f08388194fd12a8848c0b9f70034143c2cb7N.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5052
    • C:\Users\Admin\AppData\Local\Temp\_HeartbeatCache.xml.exe
      "_HeartbeatCache.xml.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5108
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:3660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1045960512-3948844814-3059691613-1000\desktop.ini.tmp

    Filesize

    44KB

    MD5

    2c243e78c1612697123c1a3a01896fb1

    SHA1

    dbeb68c021901df1ff45bfb6647e09d02c6e91e4

    SHA256

    37a6d6d3c00161e653ba1a5fcdfb98e0513ebf63c958bc0456974bf47da980a6

    SHA512

    20990a06618f0aed5437377438afb0d34c2c53a9b4194209134cf4e64ac3978ad1da2303e30b4b8684b2f2a1dcee94b5c2830527097255080846e31924526a46

  • C:\Users\Admin\AppData\Local\Temp\_HeartbeatCache.xml.exe

    Filesize

    88KB

    MD5

    cf2ce47e698dbd08508da10faa47cc88

    SHA1

    cdb47acd8500a7fc05ac6ef3d81875852fc67242

    SHA256

    04442ab332b9868657678906fb152f824096d3859b83ff11a2f923dbed916022

    SHA512

    b28533a5eeda30339254b0f8b5a95c7a8854e8eaf1e7d9626d320c797b402fdee3df03b758cefeb88444b322458f03f203d2c6336d5474d6a9b0d3d732ff0e7a

  • C:\Windows\SysWOW64\Zombie.exe

    Filesize

    43KB

    MD5

    5e4f10998496a5d42a26b599d3a55330

    SHA1

    a76bfb5560296da26afd1f3173f1dadec19ceca0

    SHA256

    d53d854d932c0ba97bef70c39b1b6b55755addd704b77dc001f2a808b9d38c08

    SHA512

    41cf83704134aa1f86e25c6d831d0766370b1c140d7dbbf57da5c32c954f2a8dbfe6527386d62a995aedb62b2459c2b79a84eaf9c73d3c25d266ff239ca1fb7d