Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 19:39
Behavioral task
behavioral1
Sample
d3d26e1ffe389545911ced5b9a7befbec71dbf0a89cf4d9fea2471ba0e0b5277.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d3d26e1ffe389545911ced5b9a7befbec71dbf0a89cf4d9fea2471ba0e0b5277.exe
Resource
win10v2004-20241007-en
General
-
Target
d3d26e1ffe389545911ced5b9a7befbec71dbf0a89cf4d9fea2471ba0e0b5277.exe
-
Size
199KB
-
MD5
d4aad543fca3084ae6b2a5d557af8b38
-
SHA1
eaacf04e69c315e7f0696d48c180e30fdf74d0a8
-
SHA256
d3d26e1ffe389545911ced5b9a7befbec71dbf0a89cf4d9fea2471ba0e0b5277
-
SHA512
c7f5098a2ff1c37fd68f977bb8f0849aa8072469d45481c2dc3a2bb2dd8f31ad9eb28754bd8cd0330b3c85eb36262cf293bc14ea3b28a947abf0ca940e7d8bec
-
SSDEEP
3072:KQSoDD9u3NTcGCLOwstyhZFChcssc56FUrgxvbSD4UQrO2+:KQSo/9KN4ShcHUa+
Malware Config
Signatures
-
Renames multiple (5019) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 1724 Zombie.exe 2208 _choco.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe d3d26e1ffe389545911ced5b9a7befbec71dbf0a89cf4d9fea2471ba0e0b5277.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe d3d26e1ffe389545911ced5b9a7befbec71dbf0a89cf4d9fea2471ba0e0b5277.exe -
resource yara_rule behavioral2/memory/2092-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x000c000000023b30-6.dat upx behavioral2/files/0x000a000000023b93-12.dat upx behavioral2/memory/2092-26-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdR_Grace-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ORGCHART.EXE.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\fur.txt.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\msquic.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Diagnostics.TraceSource.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pt-BR\UIAutomationClientSideProviders.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\THIRDPARTYLICENSEREADME.txt.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoVL_KMS_Client-ul.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\PersonaSpy\personaspybridge.js.tmp Zombie.exe File created C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-001F-0C0A-1000-0000000FF1CE.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\sr-Cyrl-BA\msipc.dll.mui.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OutlookR_Trial-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\URLREDIR.DLL.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Globalization.Extensions.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hant\System.Windows.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Arial Black-Arial.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_OEM_Perp-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentR_Grace-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019R_OEM_Perp-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Retail-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PublisherVL_MAK-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ODBCTRAC.DLL.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_Retail-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\EXCEL_COL.HXC.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsfra.xml.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Threading.Tasks.Parallel.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\cs\PresentationFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\UIAutomationClientSideProviders.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\PresentationFramework-SystemXmlLinq.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_Trial2-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\ONENOTE_COL.HXT.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.scale-100.png.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\wsdetect.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-PipelineConfig.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000042\manifest.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Client\api-ms-win-crt-process-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\Edit.png.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-heap-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\Microsoft.VisualBasic.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\ro.pak.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\cpprestsdk.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\zh-TW\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\default_apps\external_extensions.json.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\as90.xsl.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Reflection.TypeExtensions.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\tr\System.Windows.Controls.Ribbon.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-errorhandling-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProO365R_SubTrial-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.contrast-black_scale-100.png.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\CancelGlyph.16.White.png.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\ClientLangPack2019_eula.txt.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-string-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.FileSystem.AccessControl.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Runtime.Serialization.Primitives.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\System.DirectoryServices.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-core-file-l1-2-0.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\zlib.md.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\amd64\jvm.cfg.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Xml.XPath.XDocument.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Globalization.Calendars.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_Retail-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\mscorlib.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\fr\UIAutomationTypes.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\tzdb.dat.tmp Zombie.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3d26e1ffe389545911ced5b9a7befbec71dbf0a89cf4d9fea2471ba0e0b5277.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2092 wrote to memory of 1724 2092 d3d26e1ffe389545911ced5b9a7befbec71dbf0a89cf4d9fea2471ba0e0b5277.exe 84 PID 2092 wrote to memory of 1724 2092 d3d26e1ffe389545911ced5b9a7befbec71dbf0a89cf4d9fea2471ba0e0b5277.exe 84 PID 2092 wrote to memory of 1724 2092 d3d26e1ffe389545911ced5b9a7befbec71dbf0a89cf4d9fea2471ba0e0b5277.exe 84 PID 2092 wrote to memory of 2208 2092 d3d26e1ffe389545911ced5b9a7befbec71dbf0a89cf4d9fea2471ba0e0b5277.exe 85 PID 2092 wrote to memory of 2208 2092 d3d26e1ffe389545911ced5b9a7befbec71dbf0a89cf4d9fea2471ba0e0b5277.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3d26e1ffe389545911ced5b9a7befbec71dbf0a89cf4d9fea2471ba0e0b5277.exe"C:\Users\Admin\AppData\Local\Temp\d3d26e1ffe389545911ced5b9a7befbec71dbf0a89cf4d9fea2471ba0e0b5277.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1724
-
-
C:\Users\Admin\AppData\Local\Temp\_choco.exe"_choco.exe"2⤵
- Executes dropped EXE
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5a34fce85a665e068c8cad156a7204749
SHA19b0401e407391e64f95ffc45db5b1f6cab742da6
SHA2565c9e684233fc508d0c355bd068602d49efca4df199f3d5219199d4ef0ae13c65
SHA51262808319fc0176a4ef6141214474a049fc37aee10c885fc8a87ec2ce55734fedec89039b3f7a8b831c1a24991058fe0eb2fa55f0f4a8cd076fda499a6c15111f
-
Filesize
140KB
MD5c258b25b6ec8f09230e272033ad4b2fa
SHA1c4e862d33fe8915818d9e58d428c7324a436f97f
SHA25629f612bb3cc7a9712baaae62b49b0c03a661280b8bf0177b2713a13c016d0b32
SHA51221f7da9bf267f4cb897d9475f8a6f32e6f7e777c3f761b739da4038d44c2786030bc46ab54a8832205d1fb1fe944d7005eb34ddad3700c4c79bcdb932191b90c
-
Filesize
59KB
MD5d36d00c4b60d4faffd9b5399c4835390
SHA1b0d58c40b2646ebd887fde0a5085ff845fccad75
SHA25648b2b10c9e99c65983c13554f9c60b626c7d48d8670576309239535888ebb4f8
SHA5120f1511bda082fb6acf2596e8ed45946b82cdd536dd48ca9bfb2ba0bf856fc28ab7d953ca2f2fa2c4cd37da4d65030515962f1d28bcd72a3cc0e87e93dc5a39df