Analysis

  • max time kernel
    120s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2024, 00:12

General

  • Target

    eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe

  • Size

    354KB

  • MD5

    e142646687ec5b37bb8c136c3ca96b90

  • SHA1

    3f33c89e7805654f666012f80ce0e11abeab8b5a

  • SHA256

    eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faab

  • SHA512

    c6aa2b78fd407a76c1aa970bae56755e14a07c9dc5baa69357572b635cfbd68b26da4f226f0c3dca8d59b1305cc08a88a5b80ea65cd36e03c546e0ee41d54c10

  • SSDEEP

    6144:CR4W+Dffz1gUZ3sOeNw0VqIJ/uJn9tvq3v3/sSQJw1TX:CR4W+Dfhg0cvd5JIDvTJw1b

Malware Config

Signatures

  • Renames multiple (4625) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe
    "C:\Users\Admin\AppData\Local\Temp\eb1917845b8b89d14d26f5eb56c20eb9e6e2460a55bedd762221fc96b323faabN.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:632
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:5084
    • C:\Users\Admin\AppData\Local\Temp\_7z.exe
      "_7z.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4056

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1045960512-3948844814-3059691613-1000\desktop.ini.exe

          Filesize

          71KB

          MD5

          a4bc5a9d09719dd9cb171be7eb068d4d

          SHA1

          9a1eed5ce67b149d43f7e909e37b4422e893125f

          SHA256

          9ff3ee7abbf1ab6b5aa298e0837e914b74868fc235f0832f06a9679d40c0d2a9

          SHA512

          25556f38463ca66d38fbc46f18074503b2a29adff5bce38c1ac67a05791ebad96536ec5f06f8e519f8c6f2b4cf0a73b07a031d19fd57824e5852e0d8dfdb9d18

        • C:\Users\Admin\AppData\Local\Temp\_7z.exe

          Filesize

          284KB

          MD5

          a42b35f975d88c1370a7aff084ee57a7

          SHA1

          bee1408fe0b15f6f719f003e46aee5ec424cf608

          SHA256

          56cc9e7e3767c0cffae8161bf0ad13457487c1b422e2879b897dbd4bab115776

          SHA512

          b92d05515e18277db660118934e70678ee2a3bb66005bad19bb417ffaedb22a63727a5a697ca3ac0f6c48f6f5593ba45ab80f4ebdc0eaed10d80b7af04d45b23

        • C:\Windows\SysWOW64\Zombie.exe

          Filesize

          70KB

          MD5

          b8569ffa6aa3fe3e181254bde93555c6

          SHA1

          d6d2ad026e8f77de2fd44a55d5813848748cddb1

          SHA256

          019f894dd21491cca1ab3c8d0ba4040f147556c6aa35be3d86c93b0104a547af

          SHA512

          726d6bb91bbaca2777eb778b7bce4f4b47cb83dcca4be58cf95bca6a749388822801f02042599b43f6553e3e8e6f7d19523bb2dc2ab1bc34fe556f1c0c2e75ff

        • memory/632-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/5084-13-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB