Analysis

  • max time kernel
    93s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-11-2024 22:34

General

  • Target

    17-10-2024 #20/Zombie.exe

  • Size

    37KB

  • MD5

    3766e7d299fd60b99b57a8f23e3ecf80

  • SHA1

    634ac90a3e3e964e75e52071fefb96b51c824611

  • SHA256

    d091ab54c8cb7db4189a8556381b8ad9d5717be97be373caa18adaa3476eaa40

  • SHA512

    06f65b5ddc6e914ef844a71925c866bcb6e216dd5144bb28a7361801e8b555c65d327ce9adc18cb791a5a93f53ac9b1fe26bf68ad9b403a4128eb27a1c0c70d1

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+9T6My2X:kBT37CPKKdJJ1EXBwzEXBwdcMcI9daFo

Score
5/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\17-10-2024 #20\Zombie.exe
    "C:\Users\Admin\AppData\Local\Temp\17-10-2024 #20\Zombie.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2988-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2988-1-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB