Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
06/11/2024, 00:12
Behavioral task
behavioral1
Sample
eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe
Resource
win10v2004-20241007-en
General
-
Target
eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe
-
Size
354KB
-
MD5
e142646687ec5b37bb8c136c3ca96b90
-
SHA1
3f33c89e7805654f666012f80ce0e11abeab8b5a
-
SHA256
eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faab
-
SHA512
c6aa2b78fd407a76c1aa970bae56755e14a07c9dc5baa69357572b635cfbd68b26da4f226f0c3dca8d59b1305cc08a88a5b80ea65cd36e03c546e0ee41d54c10
-
SSDEEP
6144:CR4W+Dffz1gUZ3sOeNw0VqIJ/uJn9tvq3v3/sSQJw1TX:CR4W+Dfhg0cvd5JIDvTJw1b
Malware Config
Signatures
-
Renames multiple (3064) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 2348 Zombie.exe 2416 _7z.exe -
Loads dropped DLL 3 IoCs
pid Process 1268 eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe 1268 eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe 1268 eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe -
resource yara_rule behavioral1/memory/1268-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/files/0x000d000000012280-3.dat upx behavioral1/memory/2348-14-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/files/0x00060000000186f4-21.dat upx behavioral1/memory/1268-25-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_VideoInset.png.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\America\Fortaleza.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\el.pak.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\Riyadh.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\Etc\UCT.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\Indian\Mahe.tmp Zombie.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\PresentationCore.dll.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\highlight.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\NavigationLeft_SelectionSubpicture.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPBluTSFrame.png.tmp Zombie.exe File created C:\Program Files\Java\jre7\bin\sunmscapi.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\de-DE\msaddsr.dll.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\de-DE\WMM2CLIP.dll.mui.tmp Zombie.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\de-DE\ChkrRes.dll.mui.tmp Zombie.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\fr-FR\ChkrRes.dll.mui.tmp Zombie.exe File created C:\Program Files\7-Zip\7z.dll.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\mip.exe.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\travel.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Monrovia.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Goose_Bay.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\mc.jar.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-masterfs-nio2.xml.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\Kathmandu.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\FlickLearningWizard.exe.mui.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Abidjan.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\Europe\Monaco.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\de-DE\msdasqlr.dll.mui.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Rome.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Tarawa.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-host-remote_zh_CN.jar.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\Oral.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Circle_VideoInset.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.metadata_2.2.0.v20131211-1531.jar.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipskor.xml.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\TipTsf.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\en-US\MSTTSLoc.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\handler.reg.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\Knox.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\ECLIPSE_.RSA.tmp Zombie.exe File created C:\Program Files\Mozilla Firefox\defaultagent.ini.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-join.avi.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\lua\playlist\rockbox_fm_presets.luac.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\javax.servlet.jsp_2.2.0.v201112011158.jar.tmp Zombie.exe File created C:\Program Files\Java\jre7\bin\jsound.dll.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\NextMenuButtonIcon.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Athens.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\Etc\GMT-3.tmp Zombie.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\System.Data.Linq.Resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\Vincennes.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOMessageProvider.dll.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\photoedge_videoinset.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\ffjcext.zip.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-swing-outline.jar.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\nl.txt.tmp Zombie.exe File created C:\Program Files\Microsoft Games\Mahjong\MahjongMCE.lnk.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler-utilities.xml.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\hprof.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.ui.zh_CN_5.5.0.165303.jar.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\rarrow.gif.tmp Zombie.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _7z.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1268 wrote to memory of 2348 1268 eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe 31 PID 1268 wrote to memory of 2348 1268 eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe 31 PID 1268 wrote to memory of 2348 1268 eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe 31 PID 1268 wrote to memory of 2348 1268 eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe 31 PID 1268 wrote to memory of 2416 1268 eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe 32 PID 1268 wrote to memory of 2416 1268 eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe 32 PID 1268 wrote to memory of 2416 1268 eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe 32 PID 1268 wrote to memory of 2416 1268 eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe"C:\Users\Admin\AppData\Local\Temp\eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\_7z.exe"_7z.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD50643e40188d47c61bfe715a7958ea79a
SHA13a111f8a9828d42b8491e7fede42a1f17930c700
SHA256f853fb50532b3702cf0949b67f00df78bf0ff32b333c4e57e42e3e0c6ecfdc6e
SHA512eb0b6ef605f1b9609f2356e3ce3e4cd7f360404b3ea533156a73a5605d8c52f1e5839ca048c0f109feef054001853cfe770c15957e5335cf9a3226ceb5469aef
-
Filesize
284KB
MD5a42b35f975d88c1370a7aff084ee57a7
SHA1bee1408fe0b15f6f719f003e46aee5ec424cf608
SHA25656cc9e7e3767c0cffae8161bf0ad13457487c1b422e2879b897dbd4bab115776
SHA512b92d05515e18277db660118934e70678ee2a3bb66005bad19bb417ffaedb22a63727a5a697ca3ac0f6c48f6f5593ba45ab80f4ebdc0eaed10d80b7af04d45b23
-
Filesize
70KB
MD5b8569ffa6aa3fe3e181254bde93555c6
SHA1d6d2ad026e8f77de2fd44a55d5813848748cddb1
SHA256019f894dd21491cca1ab3c8d0ba4040f147556c6aa35be3d86c93b0104a547af
SHA512726d6bb91bbaca2777eb778b7bce4f4b47cb83dcca4be58cf95bca6a749388822801f02042599b43f6553e3e8e6f7d19523bb2dc2ab1bc34fe556f1c0c2e75ff