Analysis
-
max time kernel
120s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 18:38
Static task
static1
Behavioral task
behavioral1
Sample
4f6d5965280ed4995ec5806e0658f08388194fd12a8848c0b9f70034143c2cb7N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
4f6d5965280ed4995ec5806e0658f08388194fd12a8848c0b9f70034143c2cb7N.exe
Resource
win10v2004-20241007-en
General
-
Target
4f6d5965280ed4995ec5806e0658f08388194fd12a8848c0b9f70034143c2cb7N.exe
-
Size
132KB
-
MD5
7e3b497e8f252e10b9d4da2a6e939d30
-
SHA1
f79ad35889f8cc176009ec0d6320f9bedac8e737
-
SHA256
4f6d5965280ed4995ec5806e0658f08388194fd12a8848c0b9f70034143c2cb7
-
SHA512
c1712765445548eefb2528b193dc79816ef0134a51780d73137b2288a7c6fe73297128b10e893d57d94b81a40522af3e92ee937da5b31df06fb91651a395de3d
-
SSDEEP
3072:6pWpBwchcwDqqupWpBwchcwDqqOpWpBwchcwDqqu:PPfK
Malware Config
Signatures
-
Renames multiple (4624) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 3660 Zombie.exe 5108 _HeartbeatCache.xml.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe 4f6d5965280ed4995ec5806e0658f08388194fd12a8848c0b9f70034143c2cb7N.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 4f6d5965280ed4995ec5806e0658f08388194fd12a8848c0b9f70034143c2cb7N.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\System.Resources.Extensions.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_OEM_Perp-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Web.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\UIAutomationTypes.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\jfr.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_ViewOnly_ZeroGrace-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\WORD_WHATSNEW.XML.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\EduWorks Data Streamer Add-In\MicrosoftDataStreamerforExcel.dll.manifest.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ja-jp.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Threading.Channels.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-core-timezone-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdVL_KMS_Client-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-runtime-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pl\UIAutomationTypes.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pl\UIAutomationClient.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019VL_KMS_Client_AE-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MSOARIA.DLL.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\legal\jdk\asm.md.tmp Zombie.exe File created C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-006E-0409-1000-0000000FF1CE.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ExcelVL_MAK-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.contrast-white_scale-140.png.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\jjs.exe.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVOrchestration.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\it-IT\msdaremr.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Net.WebProxy.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hant\System.Windows.Forms.Design.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hant\System.Windows.Input.Manipulations.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\amd64\jvm.cfg.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_Retail-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp6-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power Map Excel Add-in\DATATRANSFORMERWRAPPER.DLL.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MEDIA\PUSH.WAV.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\ja-JP\sqlxmlx.rll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.IO.Compression.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.Http.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Security.Cryptography.Algorithms.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Georgia.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.OData.Core.NetFX35.V7.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Threading.Thread.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pt-BR\UIAutomationClient.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremDemoR_BypassTrial365-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProXC2RVL_MAKC2R-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\auxbase.xml.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ru\WindowsBase.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\fr\PresentationCore.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\fr\ReachFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019R_OEM_Perp-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LivePersonaCard\lpc.win32.bundle.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.contrast-black_scale-140.png.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.IO.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\System.Windows.Input.Manipulations.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\prism_common.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTrial2-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PersonalR_Grace-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\BORDERS\MSART1.BDR.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\it\System.Windows.Forms.Primitives.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\AccessRuntime2019R_PrepidBypass-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\QRYINT32.DLL.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\api-ms-win-core-file-l1-2-0.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MSOHEV.DLL.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVFileSystemMetadata.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Reflection.Extensions.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Runtime.Serialization.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Collections.dll.tmp Zombie.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _HeartbeatCache.xml.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f6d5965280ed4995ec5806e0658f08388194fd12a8848c0b9f70034143c2cb7N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5052 wrote to memory of 5108 5052 4f6d5965280ed4995ec5806e0658f08388194fd12a8848c0b9f70034143c2cb7N.exe 85 PID 5052 wrote to memory of 5108 5052 4f6d5965280ed4995ec5806e0658f08388194fd12a8848c0b9f70034143c2cb7N.exe 85 PID 5052 wrote to memory of 5108 5052 4f6d5965280ed4995ec5806e0658f08388194fd12a8848c0b9f70034143c2cb7N.exe 85 PID 5052 wrote to memory of 3660 5052 4f6d5965280ed4995ec5806e0658f08388194fd12a8848c0b9f70034143c2cb7N.exe 86 PID 5052 wrote to memory of 3660 5052 4f6d5965280ed4995ec5806e0658f08388194fd12a8848c0b9f70034143c2cb7N.exe 86 PID 5052 wrote to memory of 3660 5052 4f6d5965280ed4995ec5806e0658f08388194fd12a8848c0b9f70034143c2cb7N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f6d5965280ed4995ec5806e0658f08388194fd12a8848c0b9f70034143c2cb7N.exe"C:\Users\Admin\AppData\Local\Temp\4f6d5965280ed4995ec5806e0658f08388194fd12a8848c0b9f70034143c2cb7N.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\_HeartbeatCache.xml.exe"_HeartbeatCache.xml.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5108
-
-
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD52c243e78c1612697123c1a3a01896fb1
SHA1dbeb68c021901df1ff45bfb6647e09d02c6e91e4
SHA25637a6d6d3c00161e653ba1a5fcdfb98e0513ebf63c958bc0456974bf47da980a6
SHA51220990a06618f0aed5437377438afb0d34c2c53a9b4194209134cf4e64ac3978ad1da2303e30b4b8684b2f2a1dcee94b5c2830527097255080846e31924526a46
-
Filesize
88KB
MD5cf2ce47e698dbd08508da10faa47cc88
SHA1cdb47acd8500a7fc05ac6ef3d81875852fc67242
SHA25604442ab332b9868657678906fb152f824096d3859b83ff11a2f923dbed916022
SHA512b28533a5eeda30339254b0f8b5a95c7a8854e8eaf1e7d9626d320c797b402fdee3df03b758cefeb88444b322458f03f203d2c6336d5474d6a9b0d3d732ff0e7a
-
Filesize
43KB
MD55e4f10998496a5d42a26b599d3a55330
SHA1a76bfb5560296da26afd1f3173f1dadec19ceca0
SHA256d53d854d932c0ba97bef70c39b1b6b55755addd704b77dc001f2a808b9d38c08
SHA51241cf83704134aa1f86e25c6d831d0766370b1c140d7dbbf57da5c32c954f2a8dbfe6527386d62a995aedb62b2459c2b79a84eaf9c73d3c25d266ff239ca1fb7d