Overview
overview
10Static
static
107zS850A099...ed.exe
windows7_x64
107zS850A099...ed.exe
windows10-2004_x64
107zS850A099...1a.exe
windows7_x64
87zS850A099...1a.exe
windows10-2004_x64
87zS850A099...b7.exe
windows7_x64
107zS850A099...b7.exe
windows10-2004_x64
107zS850A099...5e.exe
windows7_x64
107zS850A099...5e.exe
windows10-2004_x64
17zS850A099...a0.exe
windows7_x64
107zS850A099...a0.exe
windows10-2004_x64
107zS850A099...95.exe
windows7_x64
77zS850A099...95.exe
windows10-2004_x64
77zS850A099...cb.exe
windows7_x64
107zS850A099...cb.exe
windows10-2004_x64
17zS850A099...58.exe
windows7_x64
107zS850A099...58.exe
windows10-2004_x64
107zS850A099...7f.exe
windows7_x64
107zS850A099...7f.exe
windows10-2004_x64
107zS850A099...32.exe
windows7_x64
107zS850A099...32.exe
windows10-2004_x64
107zS850A099...c3.exe
windows7_x64
87zS850A099...c3.exe
windows10-2004_x64
107zS850A099...e9.exe
windows7_x64
67zS850A099...e9.exe
windows10-2004_x64
17zS850A099...8c.exe
windows7_x64
107zS850A099...8c.exe
windows10-2004_x64
17zS850A099...8c.exe
windows7_x64
77zS850A099...8c.exe
windows10-2004_x64
87zS850A099...ll.exe
windows7_x64
107zS850A099...ll.exe
windows10-2004_x64
10Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-01-2022 18:11
Behavioral task
behavioral1
Sample
7zS850A099E/61e74fd2175cb_Tue23956aa60ed.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
7zS850A099E/61e74fd2175cb_Tue23956aa60ed.exe
Resource
win10v2004-en-20220112
Behavioral task
behavioral3
Sample
7zS850A099E/61e74fd3252fe_Tue23df2ad021a.exe
Resource
win7-en-20211208
Behavioral task
behavioral4
Sample
7zS850A099E/61e74fd3252fe_Tue23df2ad021a.exe
Resource
win10v2004-en-20220112
Behavioral task
behavioral5
Sample
7zS850A099E/61e74fd41f841_Tue2365aa82b7.exe
Resource
win7-en-20211208
Behavioral task
behavioral6
Sample
7zS850A099E/61e74fd41f841_Tue2365aa82b7.exe
Resource
win10v2004-en-20220112
Behavioral task
behavioral7
Sample
7zS850A099E/61e74fd53f766_Tue23ec97445e.exe
Resource
win7-en-20211208
Behavioral task
behavioral8
Sample
7zS850A099E/61e74fd53f766_Tue23ec97445e.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral9
Sample
7zS850A099E/61e74fd78769f_Tue234b6c24d9a0.exe
Resource
win7-en-20211208
Behavioral task
behavioral10
Sample
7zS850A099E/61e74fd78769f_Tue234b6c24d9a0.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral11
Sample
7zS850A099E/61e74fd8ef830_Tue23593425095.exe
Resource
win7-en-20211208
Behavioral task
behavioral12
Sample
7zS850A099E/61e74fd8ef830_Tue23593425095.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral13
Sample
7zS850A099E/61e74fda51500_Tue23260baecb.exe
Resource
win7-en-20211208
Behavioral task
behavioral14
Sample
7zS850A099E/61e74fda51500_Tue23260baecb.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral15
Sample
7zS850A099E/61e7501ab629f_Tue23c4645058.exe
Resource
win7-en-20211208
Behavioral task
behavioral16
Sample
7zS850A099E/61e7501ab629f_Tue23c4645058.exe
Resource
win10v2004-en-20220112
Behavioral task
behavioral17
Sample
7zS850A099E/61e7501b7eabe_Tue2344597f.exe
Resource
win7-en-20211208
Behavioral task
behavioral18
Sample
7zS850A099E/61e7501b7eabe_Tue2344597f.exe
Resource
win10v2004-en-20220112
Behavioral task
behavioral19
Sample
7zS850A099E/61e7501c830d6_Tue23bdf4712a32.exe
Resource
win7-en-20211208
Behavioral task
behavioral20
Sample
7zS850A099E/61e7501c830d6_Tue23bdf4712a32.exe
Resource
win10v2004-en-20220112
Behavioral task
behavioral21
Sample
7zS850A099E/61e7501db65f3_Tue23c7b395c3.exe
Resource
win7-en-20211208
Behavioral task
behavioral22
Sample
7zS850A099E/61e7501db65f3_Tue23c7b395c3.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral23
Sample
7zS850A099E/61e7502b8389b_Tue233252e9.exe
Resource
win7-en-20211208
Behavioral task
behavioral24
Sample
7zS850A099E/61e7502b8389b_Tue233252e9.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral25
Sample
7zS850A099E/61e7502c4cff3_Tue232cba58c.exe
Resource
win7-en-20211208
Behavioral task
behavioral26
Sample
7zS850A099E/61e7502c4cff3_Tue232cba58c.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral27
Sample
7zS850A099E/61e7502f007f3_Tue23d6fecf8c.exe
Resource
win7-en-20211208
Behavioral task
behavioral28
Sample
7zS850A099E/61e7502f007f3_Tue23d6fecf8c.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral29
Sample
7zS850A099E/setup_install.exe
Resource
win7-en-20211208
Behavioral task
behavioral30
Sample
7zS850A099E/setup_install.exe
Resource
win10v2004-en-20220112
General
-
Target
7zS850A099E/61e74fd8ef830_Tue23593425095.exe
-
Size
1.6MB
-
MD5
c4e681d218d1c9c4efe701b4c7554eb5
-
SHA1
c3b43d0fbc5ad442067546b9d40c16810bb379da
-
SHA256
825a970bd11d349ba089e70419036c01ebb8cfd06e4abbec6bf58e9c7566a5e6
-
SHA512
b8d4ee6093835b0ec398f8884097db0bf1026e581743151241fb1489b061ba463dacf35b9af17f49ddc9d22769e9ebd763d9bfdb7e4d99e47a4e256c493ba3b5
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
Processes:
rundll32.exepid process 572 rundll32.exe 572 rundll32.exe 572 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
rundll32.exepid process 572 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
61e74fd8ef830_Tue23593425095.execontrol.exedescription pid process target process PID 1564 wrote to memory of 1172 1564 61e74fd8ef830_Tue23593425095.exe control.exe PID 1564 wrote to memory of 1172 1564 61e74fd8ef830_Tue23593425095.exe control.exe PID 1564 wrote to memory of 1172 1564 61e74fd8ef830_Tue23593425095.exe control.exe PID 1564 wrote to memory of 1172 1564 61e74fd8ef830_Tue23593425095.exe control.exe PID 1172 wrote to memory of 572 1172 control.exe rundll32.exe PID 1172 wrote to memory of 572 1172 control.exe rundll32.exe PID 1172 wrote to memory of 572 1172 control.exe rundll32.exe PID 1172 wrote to memory of 572 1172 control.exe rundll32.exe PID 1172 wrote to memory of 572 1172 control.exe rundll32.exe PID 1172 wrote to memory of 572 1172 control.exe rundll32.exe PID 1172 wrote to memory of 572 1172 control.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd8ef830_Tue23593425095.exe"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd8ef830_Tue23593425095.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\G1V6MSEY.nr2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\G1V6MSEY.nr3⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\G1V6MSEY.nrMD5
e6bce7d07564e9860761b0b194d3479e
SHA193fa94682eaeeff73013a8b483f7e655a61a7971
SHA2564790a2e705aabb155bd303379709c3d8de1514b38bb0fbe96965303e217acc58
SHA51223d5277b5c13de3a82a06ce32047e65d51e2dc4420c614876a7fb4dd4863d47e3021af66cbb449714d55f07260440714d608003e46c9e8f347cc3f2dc8dcf6ca
-
\Users\Admin\AppData\Local\Temp\G1V6MSEY.nrMD5
a345b51d41d005c9035fcf679f7c92c9
SHA10e48249f29d2dfe1cc3bf4dbcb95e2b94f0efe47
SHA256ebcceb07721b13601e64df91a02ecaa0c8ee7642c29deeb7c837e6b4f8cc0abd
SHA512c5246eab56891d4cfad08a30252a5a63be91487600e65173c354900404d52f5e69ae2234fa889614ac7b65065c006645c2eea353cd41a4cfb4757d050a71eae2
-
\Users\Admin\AppData\Local\Temp\G1V6MSEY.nrMD5
719b4e0609bdbda5dbac21d85a7e106a
SHA11692e4dc9e8f43ee4592a310a5a821e121566b36
SHA2563dfc9ccc9fbf3d308c4394addd891f5ce2c0fbe0c4b9a8b35cdd21d4a50b2342
SHA512b1f80e7086e1cd667abb87a55ffbfa092cf0342bfb092e98f65fd832504c55da10e7e511a29db0082ac014b8fe50346008fafce68d23cee8571c419be2e49cfc
-
\Users\Admin\AppData\Local\Temp\G1V6MSEY.nrMD5
e2caa194016570950508549bda67e7d1
SHA1f3e584ef6878497731f864d4ca851136d8407b42
SHA256af1874d9e318c330c3f4c0a564a497c1fd4a1adb7f32cf2cbbf7adabe58975c1
SHA512fdb28280c32799665e5316a3950bce3ba4ed892a9fb84a789ea868c0c8a5ed0e5755a986bc51b0068c8b63b9d0ef7c4ec109ff6311449634870925e67dbf2860
-
memory/1564-55-0x00000000756C1000-0x00000000756C3000-memory.dmpFilesize
8KB