Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2024, 00:12

General

  • Target

    eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe

  • Size

    354KB

  • MD5

    e142646687ec5b37bb8c136c3ca96b90

  • SHA1

    3f33c89e7805654f666012f80ce0e11abeab8b5a

  • SHA256

    eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faab

  • SHA512

    c6aa2b78fd407a76c1aa970bae56755e14a07c9dc5baa69357572b635cfbd68b26da4f226f0c3dca8d59b1305cc08a88a5b80ea65cd36e03c546e0ee41d54c10

  • SSDEEP

    6144:CR4W+Dffz1gUZ3sOeNw0VqIJ/uJn9tvq3v3/sSQJw1TX:CR4W+Dfhg0cvd5JIDvTJw1b

Malware Config

Signatures

  • Renames multiple (3064) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe
    "C:\Users\Admin\AppData\Local\Temp\eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:2348
    • C:\Users\Admin\AppData\Local\Temp\_7z.exe
      "_7z.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2416

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1163522206-1469769407-485553996-1000\desktop.ini.tmp

          Filesize

          71KB

          MD5

          0643e40188d47c61bfe715a7958ea79a

          SHA1

          3a111f8a9828d42b8491e7fede42a1f17930c700

          SHA256

          f853fb50532b3702cf0949b67f00df78bf0ff32b333c4e57e42e3e0c6ecfdc6e

          SHA512

          eb0b6ef605f1b9609f2356e3ce3e4cd7f360404b3ea533156a73a5605d8c52f1e5839ca048c0f109feef054001853cfe770c15957e5335cf9a3226ceb5469aef

        • C:\Users\Admin\AppData\Local\Temp\_7z.exe

          Filesize

          284KB

          MD5

          a42b35f975d88c1370a7aff084ee57a7

          SHA1

          bee1408fe0b15f6f719f003e46aee5ec424cf608

          SHA256

          56cc9e7e3767c0cffae8161bf0ad13457487c1b422e2879b897dbd4bab115776

          SHA512

          b92d05515e18277db660118934e70678ee2a3bb66005bad19bb417ffaedb22a63727a5a697ca3ac0f6c48f6f5593ba45ab80f4ebdc0eaed10d80b7af04d45b23

        • \Windows\SysWOW64\Zombie.exe

          Filesize

          70KB

          MD5

          b8569ffa6aa3fe3e181254bde93555c6

          SHA1

          d6d2ad026e8f77de2fd44a55d5813848748cddb1

          SHA256

          019f894dd21491cca1ab3c8d0ba4040f147556c6aa35be3d86c93b0104a547af

          SHA512

          726d6bb91bbaca2777eb778b7bce4f4b47cb83dcca4be58cf95bca6a749388822801f02042599b43f6553e3e8e6f7d19523bb2dc2ab1bc34fe556f1c0c2e75ff

        • memory/1268-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/1268-10-0x0000000000260000-0x000000000026A000-memory.dmp

          Filesize

          40KB

        • memory/1268-5-0x0000000000260000-0x000000000026A000-memory.dmp

          Filesize

          40KB

        • memory/1268-25-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2348-14-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB