Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250502-en -
resource tags
arch:x64arch:x86image:win10v2004-20250502-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2025, 11:56
Static task
static1
Behavioral task
behavioral1
Sample
c866485f17cf458dd576fd1793616d2e517fab50831a146a9c92abd79101dd7a.exe
Resource
win10v2004-20250502-en
General
-
Target
c866485f17cf458dd576fd1793616d2e517fab50831a146a9c92abd79101dd7a.exe
-
Size
81KB
-
MD5
a7eb60af984e9ad21bc2758907738663
-
SHA1
e6b2d82662b82a58457641710f00a76a28ad676d
-
SHA256
c866485f17cf458dd576fd1793616d2e517fab50831a146a9c92abd79101dd7a
-
SHA512
121e9fe269fc368e3b2ee8968d2606505a18b9be9faec17adcdc39f3c45ec35fefafd3f91b785cb088fcf1df89fbaef18c5bd34a9f1849e6bf8c902f6defcc9e
-
SSDEEP
1536:uGIIHp1MkPMkTgZgaX+I8K/XCKCGSqzVi:3gZgU+ufC58A
Malware Config
Signatures
-
Cosmu family
-
Detects Cosmu payload 1 IoCs
Cosmu is a worm written in C++.
resource yara_rule behavioral1/memory/4868-23-0x0000000000400000-0x0000000000407000-memory.dmp family_cosmu -
Renames multiple (5273) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 3088 _createdump.exe 3680 Zombie.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe c866485f17cf458dd576fd1793616d2e517fab50831a146a9c92abd79101dd7a.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe c866485f17cf458dd576fd1793616d2e517fab50831a146a9c92abd79101dd7a.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\tr\WindowsBase.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-crt-process-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019VL_MAK_AE-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\mng2.txt.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsjpn.xml.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.15\System.IO.FileSystem.Primitives.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.15\System.Text.Json.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\vcruntime140_cor3.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Client.Initialization.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power Map Excel Add-in\VISUALIZATIONGRAPHICS.DLL.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.AnalysisServices.Excel.Common.FrontEnd.XmlSerializers.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\RepoMan.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription4-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\PROOF\MSSP7EN.dub.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pt-BR\System.Windows.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.15\es\PresentationFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.15\UIAutomationClientSideProviders.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.scale-140.png.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.15\ja\System.Windows.Input.Manipulations.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\bin\javac.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Blue.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\pt-PT\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.Quic.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\System.Configuration.ConfigurationManager.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail3-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\rsod\powerpivot.x-none.msi.16.x-none.boot.tree.dat.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\rsod\proofing.msi.16.en-us.tree.dat.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\lib\dt.jar.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\ext\nashorn.jar.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Access2019VL_MAK_AE-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\EQUATION\api-ms-win-crt-conio-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\ShapeCollector.exe.mui.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\policytool.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\OWSSUPP.DLL.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\oledb32r.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.ComponentModel.Primitives.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019VL_MAK_AE-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_Trial-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\OFFICE\Heartbeat\HeartbeatCache.xml.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-crt-locale-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.Compression.FileSystem.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hant\System.Windows.Forms.Design.resources.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\msadc\ja-JP\msdaprsr.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.15\System.Diagnostics.TextWriterTraceListener.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-core-profile-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\StandardMSDNR_Retail-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\TimelessResume.dotx.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\jfr\default.jfc.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdR_Retail-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\security\policy\limited\local_policy.jar.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest1-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_Trial-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OutlookR_Trial-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019XC2RVL_KMS_ClientC2R-ul.xrm-ms.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\icu.md.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\api-ms-win-crt-conio-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_Trial-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LivePersonaCard\images\default\linkedin_ghost_profile.png.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\sdxs.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\BORDERS\MSART3.BDR.tmp Zombie.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c866485f17cf458dd576fd1793616d2e517fab50831a146a9c92abd79101dd7a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Zombie.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4868 wrote to memory of 3088 4868 c866485f17cf458dd576fd1793616d2e517fab50831a146a9c92abd79101dd7a.exe 88 PID 4868 wrote to memory of 3088 4868 c866485f17cf458dd576fd1793616d2e517fab50831a146a9c92abd79101dd7a.exe 88 PID 4868 wrote to memory of 3680 4868 c866485f17cf458dd576fd1793616d2e517fab50831a146a9c92abd79101dd7a.exe 89 PID 4868 wrote to memory of 3680 4868 c866485f17cf458dd576fd1793616d2e517fab50831a146a9c92abd79101dd7a.exe 89 PID 4868 wrote to memory of 3680 4868 c866485f17cf458dd576fd1793616d2e517fab50831a146a9c92abd79101dd7a.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c866485f17cf458dd576fd1793616d2e517fab50831a146a9c92abd79101dd7a.exe"C:\Users\Admin\AppData\Local\Temp\c866485f17cf458dd576fd1793616d2e517fab50831a146a9c92abd79101dd7a.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\_createdump.exe"_createdump.exe"2⤵
- Executes dropped EXE
PID:3088
-
-
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3680
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD53c3fdcaf5b86bec4bb2670ff32a7ee1d
SHA10f72d256a5c28767f88c11f9cc59fa1326e5dd66
SHA256bf27f74b0bf6baa60cbbeac2f59af92fa94b04ea9308975d4f0445a74c366449
SHA5128a700829d272f4cb05f537e58afb5c4265d70109118f708cdebbe3b8c3ce15f7a3938cd1f9d87e9857afe2a0d06889f5d22add5a28f8b67ca944e6aa29a601df
-
Filesize
56KB
MD5a05b36f6129223951282f9df776761b1
SHA1ec87fa41a670cffa5d77f64366fe109278661f2c
SHA2565113e7ae92f3a7aebc7f8e363209866d4d743b06a26c67e0886979a56fd3a10d
SHA51238b588b28057994305a3abc37d98770ab7ff905cba6da35e91b2936b99823955fc91b90a23174d53337dd62e320b9bac066b76734bf657de9fad6d37071c70da
-
Filesize
25KB
MD5fcd15511ba50c6c59efef7a352352329
SHA1ef1c38322fb9bdc6ba5f2e10ac2bfc7844ecc8a4
SHA2560d14960e6b013659736bf98f6554b0d0a4891031a92dc8246233f427f64767b6
SHA51211cdb9f20f065494989ee91b19122d42a57a0fdd9e145e637418eb75e889fde809f7adb6e760481d2c7560548f09f0f11931d42aca034f424842a260fe08e1e9