Analysis
-
max time kernel
150s -
max time network
103s -
platform
windows11-21h2_x64 -
resource
win11-20250502-en -
resource tags
arch:x64arch:x86image:win11-20250502-enlocale:en-usos:windows11-21h2-x64system -
submitted
18/05/2025, 11:53
Static task
static1
Behavioral task
behavioral1
Sample
be2b8d4c2e8aa37b93a6c39d02b19daeed7f4c7674865bbb67129e11f8938e17.exe
Resource
win10v2004-20250502-en
Behavioral task
behavioral2
Sample
be2b8d4c2e8aa37b93a6c39d02b19daeed7f4c7674865bbb67129e11f8938e17.exe
Resource
win11-20250502-en
General
-
Target
be2b8d4c2e8aa37b93a6c39d02b19daeed7f4c7674865bbb67129e11f8938e17.exe
-
Size
136KB
-
MD5
c35bbdaacb825f9ff7398b374948b83e
-
SHA1
5184279419e4baa06ad61667fa7fc40255eaf67e
-
SHA256
be2b8d4c2e8aa37b93a6c39d02b19daeed7f4c7674865bbb67129e11f8938e17
-
SHA512
2fd04fa2299680101c29daf78a6142fb486058fb3f0d777dba609cc57b6e05d5369fe1f3b020947aed6788b53b54906c37cccd71e6e3b976508ba415ef85578d
-
SSDEEP
1536:uGIIZymvG4PDo2DhA3lr1fBY4iKos40wm0PW1IrqJfMtQlD8x89u7F8:VnzhQNv40j0PW1IrEfMtyhum
Malware Config
Signatures
-
Renames multiple (5363) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 3544 Zombie.exe 2252 _AcroServicesUpdater2_x64.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe be2b8d4c2e8aa37b93a6c39d02b19daeed7f4c7674865bbb67129e11f8938e17.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe be2b8d4c2e8aa37b93a6c39d02b19daeed7f4c7674865bbb67129e11f8938e17.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\fr\UIAutomationClientSideProviders.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\deploy\messages_de.properties.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\AccessR_Retail-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019DemoR_BypassTrial180-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentR_OEM_Perp-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_Retail-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\Wordcnvr.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\rsod\office32mui.msi.16.en-us.boot.tree.dat.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\tr-TR\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.15\cs\System.Xaml.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\java.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Excel2019VL_KMS_Client_AE-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019XC2RVL_MAKC2R-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Grace-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest5-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019VL_KMS_Client_AE-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp5-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\OSFSHARED.DLL.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL002.XML.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL011.XML.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Cartridges\as90.xsl.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\tabskb.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.ComponentModel.EventBasedAsync.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pt-BR\WindowsFormsIntegration.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ru\WindowsBase.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdO365R_Subscription-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000049\StoreLogo.png.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hans\System.Xaml.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\es\WindowsFormsIntegration.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-debug-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription3-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdR_Retail-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProVL_MAK-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-math-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\SkypeSrv\MSO20SKYPEWIN32.DLL.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\sq.txt.tmp Zombie.exe File created C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-0016-0409-1000-0000000FF1CE.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\1033\SFMESSAGES.XML.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\LibCurl64.DllA\OpenSSL64.DllA\zlibwapi.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Green.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote.gpd.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\pt-PT\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\fonts\LucidaSansRegular.ttf.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL010.XML.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Help\Hx.HxC.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.15\System.Text.Encoding.Extensions.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\legal\javafx\directshow.md.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessPipcDemoR_BypassTrial365-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\OriginLetter.Dotx.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-interlocked-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\ext\localedata.jar.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\cs\UIAutomationProvider.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-core-libraryloader-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\images\cursors\invalid32x32.gif.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Retail2-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-localization-l1-2-0.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.15\System.Diagnostics.DiagnosticSource.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\tzdb.dat.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-string-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp6-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.contrast-white_scale-80.png.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\de-DE\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pt-BR\Microsoft.VisualBasic.Forms.resources.dll.tmp Zombie.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be2b8d4c2e8aa37b93a6c39d02b19daeed7f4c7674865bbb67129e11f8938e17.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2252 _AcroServicesUpdater2_x64.exe 2252 _AcroServicesUpdater2_x64.exe 2252 _AcroServicesUpdater2_x64.exe 2252 _AcroServicesUpdater2_x64.exe 2252 _AcroServicesUpdater2_x64.exe 2252 _AcroServicesUpdater2_x64.exe 2252 _AcroServicesUpdater2_x64.exe 2252 _AcroServicesUpdater2_x64.exe 2252 _AcroServicesUpdater2_x64.exe 2252 _AcroServicesUpdater2_x64.exe 2252 _AcroServicesUpdater2_x64.exe 2252 _AcroServicesUpdater2_x64.exe 2252 _AcroServicesUpdater2_x64.exe 2252 _AcroServicesUpdater2_x64.exe 2252 _AcroServicesUpdater2_x64.exe 2252 _AcroServicesUpdater2_x64.exe 2252 _AcroServicesUpdater2_x64.exe 2252 _AcroServicesUpdater2_x64.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 5412 wrote to memory of 3544 5412 be2b8d4c2e8aa37b93a6c39d02b19daeed7f4c7674865bbb67129e11f8938e17.exe 81 PID 5412 wrote to memory of 3544 5412 be2b8d4c2e8aa37b93a6c39d02b19daeed7f4c7674865bbb67129e11f8938e17.exe 81 PID 5412 wrote to memory of 3544 5412 be2b8d4c2e8aa37b93a6c39d02b19daeed7f4c7674865bbb67129e11f8938e17.exe 81 PID 5412 wrote to memory of 2252 5412 be2b8d4c2e8aa37b93a6c39d02b19daeed7f4c7674865bbb67129e11f8938e17.exe 82 PID 5412 wrote to memory of 2252 5412 be2b8d4c2e8aa37b93a6c39d02b19daeed7f4c7674865bbb67129e11f8938e17.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\be2b8d4c2e8aa37b93a6c39d02b19daeed7f4c7674865bbb67129e11f8938e17.exe"C:\Users\Admin\AppData\Local\Temp\be2b8d4c2e8aa37b93a6c39d02b19daeed7f4c7674865bbb67129e11f8938e17.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5412 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3544
-
-
C:\Users\Admin\AppData\Local\Temp\_AcroServicesUpdater2_x64.exe"_AcroServicesUpdater2_x64.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2252
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5fc9cd616dde46d4bd90edddbed9c7628
SHA12fe761a9fe8e52d65019169631bc4ebaba754ae1
SHA2560625156a69c80e673f3b90a02d74c41cdd05d83bf0360d92d5ac50ddae0a2e1f
SHA512495a73c483ad587f07f6ba4f0660aa26872e814c9065203c60e7cb4588b999aeb70fd304a3eff71eadc3eb68348ae64b032f03047c9fa0e3c9c5acb89aba168e
-
Filesize
13B
MD5c83301425b2ad1d496473a5ff3d9ecca
SHA1941efb7368e46b27b937d34b07fc4d41da01b002
SHA256b633a587c652d02386c4f16f8c6f6aab7352d97f16367c3c40576214372dd628
SHA51283bafe4c888008afdd1b72c028c7f50dee651ca9e7d8e1b332e0bf3aa1315884155a1458a304f6e5c5627e714bf5a855a8b8d7db3f4eb2bb2789fe2f8f6a1d83
-
Filesize
119KB
MD5aba284c3712f8cdb2fdc70689933a909
SHA1e836d2554ff9043605d333eace443b95c5ceb55d
SHA25699727a25e431134f75c9342ca608d1007ea31733f7fd4dda32356e5e36c23f9b
SHA512217ab6bfff758b1137aadaa9878727493e3efe5a72412bd4eedcb538854c5e25dcad17c7446443174b0e2ab695a9dbf7c7b67c86c89fd48055c04c2e10dfecd4
-
Filesize
17KB
MD5229d7d6c64dffbdf649b205df66ed1fd
SHA153f7936d7dc02c59c08136bf29f60dc46e766d92
SHA2564f8fff1eade9ef26fef0881e27fae158da5a8fc2bc6ce0128ba10d6e34780cf8
SHA512fb04bb96a7918419fe0f47a5a93d825abbcbc4a597f3b7a302dcb169d5593343713429d75b356cc75bd80bc8ba91d63ffb1a5f180d9029acd4462bc799839f58