Analysis
-
max time kernel
120s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2024, 00:12
Behavioral task
behavioral1
Sample
eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe
Resource
win10v2004-20241007-en
General
-
Target
eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe
-
Size
354KB
-
MD5
e142646687ec5b37bb8c136c3ca96b90
-
SHA1
3f33c89e7805654f666012f80ce0e11abeab8b5a
-
SHA256
eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faab
-
SHA512
c6aa2b78fd407a76c1aa970bae56755e14a07c9dc5baa69357572b635cfbd68b26da4f226f0c3dca8d59b1305cc08a88a5b80ea65cd36e03c546e0ee41d54c10
-
SSDEEP
6144:CR4W+Dffz1gUZ3sOeNw0VqIJ/uJn9tvq3v3/sSQJw1TX:CR4W+Dfhg0cvd5JIDvTJw1b
Malware Config
Signatures
-
Renames multiple (4625) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 5084 Zombie.exe 4056 _7z.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe -
resource yara_rule behavioral2/memory/632-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x0007000000023c86-12.dat upx behavioral2/memory/5084-13-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/files/0x000a000000023bb9-7.dat upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\es\System.Windows.Controls.Ribbon.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hant\UIAutomationTypes.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\deploy\ffjcext.zip.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\ZeroByteFile.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.FileSystem.Watcher.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Net.WebSockets.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\cs\WindowsBase.resources.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientCapabilities.json.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Memory.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp3-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdXC2RVL_KMS_ClientC2R-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\PresentationFramework.Aero.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LivePersonaCard\images\default\linkedin_ghost_school.png.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\it-IT\msadcer.dll.mui.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_Trial-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Office.Interop.Excel.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\adcjavas.inc.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.ComponentModel.TypeConverter.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Trial-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogo.contrast-black_scale-80.png.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PersonalDemoR_BypassTrial180-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019VL_KMS_Client_AE-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\mscss7wre_fr.dub.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-file-l2-1-0.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\net.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Integration\C2RManifest.officemuiset.msi.16.en-us.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Facet.thmx.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Integration\C2RManifest.Proof.Culture.msi.16.fr-fr.xml.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\msvcp120.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Net.Mail.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\plugin2\msvcp140.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Calibri-Cambria.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentVNextR_Trial-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProO365R_Subscription-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.contrast-black_scale-80.png.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Runtime.Serialization.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ko\WindowsBase.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\javafx_iio.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPointVL_MAK-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\tr\PresentationCore.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\es\System.Xaml.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\de\UIAutomationProvider.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pt-BR\System.Windows.Forms.Primitives.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogo.scale-100.png.tmp Zombie.exe File created C:\Program Files\Common Files\System\en-US\wab32res.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\System.Windows.Controls.Ribbon.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pl\UIAutomationTypes.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\EXPTOOWS.DLL.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power Map Excel Add-in\VISUALIZATIONDIRECTX.DLL.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\ucrtbase.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\adcvbs.inc.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Client\api-ms-win-crt-runtime-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\mscorrc.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.ComponentModel.EventBasedAsync.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\it\System.Windows.Forms.Design.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdXC2RVL_KMS_ClientC2R-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Linq.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\keytool.exe.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\ext\access-bridge-64.jar.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ko\Microsoft.VisualBasic.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusiness2019R_Trial-ul-oob.xrm-ms.tmp Zombie.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _7z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 632 wrote to memory of 5084 632 eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe 84 PID 632 wrote to memory of 5084 632 eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe 84 PID 632 wrote to memory of 5084 632 eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe 84 PID 632 wrote to memory of 4056 632 eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe 85 PID 632 wrote to memory of 4056 632 eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe 85 PID 632 wrote to memory of 4056 632 eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe"C:\Users\Admin\AppData\Local\Temp\eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:5084
-
-
C:\Users\Admin\AppData\Local\Temp\_7z.exe"_7z.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5a4bc5a9d09719dd9cb171be7eb068d4d
SHA19a1eed5ce67b149d43f7e909e37b4422e893125f
SHA2569ff3ee7abbf1ab6b5aa298e0837e914b74868fc235f0832f06a9679d40c0d2a9
SHA51225556f38463ca66d38fbc46f18074503b2a29adff5bce38c1ac67a05791ebad96536ec5f06f8e519f8c6f2b4cf0a73b07a031d19fd57824e5852e0d8dfdb9d18
-
Filesize
284KB
MD5a42b35f975d88c1370a7aff084ee57a7
SHA1bee1408fe0b15f6f719f003e46aee5ec424cf608
SHA25656cc9e7e3767c0cffae8161bf0ad13457487c1b422e2879b897dbd4bab115776
SHA512b92d05515e18277db660118934e70678ee2a3bb66005bad19bb417ffaedb22a63727a5a697ca3ac0f6c48f6f5593ba45ab80f4ebdc0eaed10d80b7af04d45b23
-
Filesize
70KB
MD5b8569ffa6aa3fe3e181254bde93555c6
SHA1d6d2ad026e8f77de2fd44a55d5813848748cddb1
SHA256019f894dd21491cca1ab3c8d0ba4040f147556c6aa35be3d86c93b0104a547af
SHA512726d6bb91bbaca2777eb778b7bce4f4b47cb83dcca4be58cf95bca6a749388822801f02042599b43f6553e3e8e6f7d19523bb2dc2ab1bc34fe556f1c0c2e75ff