Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250502-en -
resource tags
arch:x64arch:x86image:win10v2004-20250502-enlocale:en-usos:windows10-2004-x64system -
submitted
18/05/2025, 09:57
Static task
static1
Behavioral task
behavioral1
Sample
b265641b1e581318d79f2dc7dbdc8e43640f763b0d9d78fcdb6fde8ebc6579d0.exe
Resource
win10v2004-20250502-en
General
-
Target
b265641b1e581318d79f2dc7dbdc8e43640f763b0d9d78fcdb6fde8ebc6579d0.exe
-
Size
74KB
-
MD5
58fd583afd75de9a8449f8dfa8e0c9ba
-
SHA1
3aec992df8e00529c201ed084aea17549bba1d65
-
SHA256
b265641b1e581318d79f2dc7dbdc8e43640f763b0d9d78fcdb6fde8ebc6579d0
-
SHA512
a921fce88845845026f0bf52393af75796f4fda58f18d0f4ed993ca2adb610416365fa8f701e2f540b3b556ddf34b90621c23e721d9d07f397138b2750e06a6d
-
SSDEEP
768:uZ4FLz8ae+rOn8ae+rOnE2lGZD4TzvPYNWw1Asvvzzv6t0+3eQKyvqjjUJu9zVBG:uGIIO+I8K/XCKCGSqzVI
Malware Config
Signatures
-
Renames multiple (5257) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 5712 _createdump.exe 3936 Zombie.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe b265641b1e581318d79f2dc7dbdc8e43640f763b0d9d78fcdb6fde8ebc6579d0.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe b265641b1e581318d79f2dc7dbdc8e43640f763b0d9d78fcdb6fde8ebc6579d0.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\vfs\Fonts\private\NIRMALA.TTF.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.15\System.Collections.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.15\System.IO.FileSystem.AccessControl.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.15\ja\WindowsFormsIntegration.resources.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\133.0.6943.60\Locales\es.pak.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\j2pkcs11.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription1-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.15\System.Threading.Tasks.Dataflow.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.15\es\System.Windows.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-core-file-l2-1-0.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\bin\javah.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Grace-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.OleDbProvider.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\OMRAUT.DLL.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365EduCloudEDUR_Subscription-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ONBttnOL.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.15\System.Net.NetworkInformation.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hant\WindowsBase.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.15\ja\System.Windows.Forms.Primitives.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\vcruntime140.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\lib\deployment.config.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\rsod\excel.x-none.msi.16.x-none.tree.dat.tmp Zombie.exe File created C:\Program Files\7-Zip\License.txt.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\keypadbase.xml.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-file-l1-2-0.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Diagnostics.Process.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019R_OEM_Perp-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProCO365R_SubTest-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_Retail2-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.contrast-white_scale-100.png.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.15\tr\PresentationCore.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\ext\access-bridge-64.jar.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\README.html.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial5-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.scale-80.png.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Redshift\lib\OpenSSL64.DllA\ssleay32.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\prnSendToOneNote.cat.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\tabskb.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Linq.Parallel.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Slipstream.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\vfs\Fonts\private\BSSYM7.TTF.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\tk.txt.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\fr-FR\msdaprsr.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.15\System.Web.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.15\PresentationFramework.AeroLite.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\133.0.6943.60\chrome_100_percent.pak.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-crt-math-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\bin\schemagen.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\c2rpridslicensefiles_auto.xml.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\cmm\CIEXYZ.pf.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OutlookR_Retail-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_Retail-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\ClientARMRefer2019_eula.txt.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.Office.PowerPivot.ExcelAddIn.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\Configuration\config.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\rsod\officemui.msi.16.en-us.boot.tree.dat.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.15\ja\System.Windows.Controls.Ribbon.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\plugin2\vcruntime140.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\verify.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial2-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\WORDICON.EXE.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\VSTO\vstoee.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\de-DE\msadcor.dll.mui.tmp Zombie.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b265641b1e581318d79f2dc7dbdc8e43640f763b0d9d78fcdb6fde8ebc6579d0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2356 wrote to memory of 5712 2356 b265641b1e581318d79f2dc7dbdc8e43640f763b0d9d78fcdb6fde8ebc6579d0.exe 87 PID 2356 wrote to memory of 5712 2356 b265641b1e581318d79f2dc7dbdc8e43640f763b0d9d78fcdb6fde8ebc6579d0.exe 87 PID 2356 wrote to memory of 3936 2356 b265641b1e581318d79f2dc7dbdc8e43640f763b0d9d78fcdb6fde8ebc6579d0.exe 86 PID 2356 wrote to memory of 3936 2356 b265641b1e581318d79f2dc7dbdc8e43640f763b0d9d78fcdb6fde8ebc6579d0.exe 86 PID 2356 wrote to memory of 3936 2356 b265641b1e581318d79f2dc7dbdc8e43640f763b0d9d78fcdb6fde8ebc6579d0.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\b265641b1e581318d79f2dc7dbdc8e43640f763b0d9d78fcdb6fde8ebc6579d0.exe"C:\Users\Admin\AppData\Local\Temp\b265641b1e581318d79f2dc7dbdc8e43640f763b0d9d78fcdb6fde8ebc6579d0.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3936
-
-
C:\Users\Admin\AppData\Local\Temp\_createdump.exe"_createdump.exe"2⤵
- Executes dropped EXE
PID:5712
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD5c946801f6ad918858a3a545ef87b228e
SHA13e12f77f6f2c92f162adf059d594afe5a26f71ae
SHA25653c8973b819e3234d42243e54816fe4ca28ff6676cc087404e8d045d61065c56
SHA512e9edc75477eb21328116607fc0a6ba88b57531c0a7ba18d60acd4d63480a597be9bb807fedc4a7b2191f6ff7037d54822dd8a91f6a58e9f18775d3f4828e3bd6
-
Filesize
56KB
MD5a05b36f6129223951282f9df776761b1
SHA1ec87fa41a670cffa5d77f64366fe109278661f2c
SHA2565113e7ae92f3a7aebc7f8e363209866d4d743b06a26c67e0886979a56fd3a10d
SHA51238b588b28057994305a3abc37d98770ab7ff905cba6da35e91b2936b99823955fc91b90a23174d53337dd62e320b9bac066b76734bf657de9fad6d37071c70da
-
Filesize
17KB
MD581fc313583ccf1af2e200d929f8296ac
SHA1367ebe8c9279cfe7ff9bcfcfb79abe2a84ab5aac
SHA2562db302b332c82e45bb493ba1eb081041da9ec60c861ec82c65d6f5177d13b9d7
SHA512628bb9220a1aececfeae1173e0efdf9e6eb21e5304f0a40492c3339c11b70c403376a368189ccf4a71ed0d3600c7ccc196531b2c2bb3cf92bd33187b35d1534c