Overview
overview
10Static
static
107zS850A099...ed.exe
windows7_x64
107zS850A099...ed.exe
windows10-2004_x64
107zS850A099...1a.exe
windows7_x64
87zS850A099...1a.exe
windows10-2004_x64
87zS850A099...b7.exe
windows7_x64
107zS850A099...b7.exe
windows10-2004_x64
107zS850A099...5e.exe
windows7_x64
107zS850A099...5e.exe
windows10-2004_x64
17zS850A099...a0.exe
windows7_x64
107zS850A099...a0.exe
windows10-2004_x64
107zS850A099...95.exe
windows7_x64
77zS850A099...95.exe
windows10-2004_x64
77zS850A099...cb.exe
windows7_x64
107zS850A099...cb.exe
windows10-2004_x64
17zS850A099...58.exe
windows7_x64
107zS850A099...58.exe
windows10-2004_x64
107zS850A099...7f.exe
windows7_x64
107zS850A099...7f.exe
windows10-2004_x64
107zS850A099...32.exe
windows7_x64
107zS850A099...32.exe
windows10-2004_x64
107zS850A099...c3.exe
windows7_x64
87zS850A099...c3.exe
windows10-2004_x64
107zS850A099...e9.exe
windows7_x64
67zS850A099...e9.exe
windows10-2004_x64
17zS850A099...8c.exe
windows7_x64
107zS850A099...8c.exe
windows10-2004_x64
17zS850A099...8c.exe
windows7_x64
77zS850A099...8c.exe
windows10-2004_x64
87zS850A099...ll.exe
windows7_x64
107zS850A099...ll.exe
windows10-2004_x64
10Analysis
-
max time kernel
127s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-01-2022 18:11
Behavioral task
behavioral1
Sample
7zS850A099E/61e74fd2175cb_Tue23956aa60ed.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
7zS850A099E/61e74fd2175cb_Tue23956aa60ed.exe
Resource
win10v2004-en-20220112
Behavioral task
behavioral3
Sample
7zS850A099E/61e74fd3252fe_Tue23df2ad021a.exe
Resource
win7-en-20211208
Behavioral task
behavioral4
Sample
7zS850A099E/61e74fd3252fe_Tue23df2ad021a.exe
Resource
win10v2004-en-20220112
Behavioral task
behavioral5
Sample
7zS850A099E/61e74fd41f841_Tue2365aa82b7.exe
Resource
win7-en-20211208
Behavioral task
behavioral6
Sample
7zS850A099E/61e74fd41f841_Tue2365aa82b7.exe
Resource
win10v2004-en-20220112
Behavioral task
behavioral7
Sample
7zS850A099E/61e74fd53f766_Tue23ec97445e.exe
Resource
win7-en-20211208
Behavioral task
behavioral8
Sample
7zS850A099E/61e74fd53f766_Tue23ec97445e.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral9
Sample
7zS850A099E/61e74fd78769f_Tue234b6c24d9a0.exe
Resource
win7-en-20211208
Behavioral task
behavioral10
Sample
7zS850A099E/61e74fd78769f_Tue234b6c24d9a0.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral11
Sample
7zS850A099E/61e74fd8ef830_Tue23593425095.exe
Resource
win7-en-20211208
Behavioral task
behavioral12
Sample
7zS850A099E/61e74fd8ef830_Tue23593425095.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral13
Sample
7zS850A099E/61e74fda51500_Tue23260baecb.exe
Resource
win7-en-20211208
Behavioral task
behavioral14
Sample
7zS850A099E/61e74fda51500_Tue23260baecb.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral15
Sample
7zS850A099E/61e7501ab629f_Tue23c4645058.exe
Resource
win7-en-20211208
Behavioral task
behavioral16
Sample
7zS850A099E/61e7501ab629f_Tue23c4645058.exe
Resource
win10v2004-en-20220112
Behavioral task
behavioral17
Sample
7zS850A099E/61e7501b7eabe_Tue2344597f.exe
Resource
win7-en-20211208
Behavioral task
behavioral18
Sample
7zS850A099E/61e7501b7eabe_Tue2344597f.exe
Resource
win10v2004-en-20220112
Behavioral task
behavioral19
Sample
7zS850A099E/61e7501c830d6_Tue23bdf4712a32.exe
Resource
win7-en-20211208
Behavioral task
behavioral20
Sample
7zS850A099E/61e7501c830d6_Tue23bdf4712a32.exe
Resource
win10v2004-en-20220112
Behavioral task
behavioral21
Sample
7zS850A099E/61e7501db65f3_Tue23c7b395c3.exe
Resource
win7-en-20211208
Behavioral task
behavioral22
Sample
7zS850A099E/61e7501db65f3_Tue23c7b395c3.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral23
Sample
7zS850A099E/61e7502b8389b_Tue233252e9.exe
Resource
win7-en-20211208
Behavioral task
behavioral24
Sample
7zS850A099E/61e7502b8389b_Tue233252e9.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral25
Sample
7zS850A099E/61e7502c4cff3_Tue232cba58c.exe
Resource
win7-en-20211208
Behavioral task
behavioral26
Sample
7zS850A099E/61e7502c4cff3_Tue232cba58c.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral27
Sample
7zS850A099E/61e7502f007f3_Tue23d6fecf8c.exe
Resource
win7-en-20211208
Behavioral task
behavioral28
Sample
7zS850A099E/61e7502f007f3_Tue23d6fecf8c.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral29
Sample
7zS850A099E/setup_install.exe
Resource
win7-en-20211208
Behavioral task
behavioral30
Sample
7zS850A099E/setup_install.exe
Resource
win10v2004-en-20220112
General
-
Target
7zS850A099E/61e74fd8ef830_Tue23593425095.exe
-
Size
1.6MB
-
MD5
c4e681d218d1c9c4efe701b4c7554eb5
-
SHA1
c3b43d0fbc5ad442067546b9d40c16810bb379da
-
SHA256
825a970bd11d349ba089e70419036c01ebb8cfd06e4abbec6bf58e9c7566a5e6
-
SHA512
b8d4ee6093835b0ec398f8884097db0bf1026e581743151241fb1489b061ba463dacf35b9af17f49ddc9d22769e9ebd763d9bfdb7e4d99e47a4e256c493ba3b5
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
61e74fd8ef830_Tue23593425095.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 61e74fd8ef830_Tue23593425095.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exepid process 1788 rundll32.exe 1788 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
rundll32.exepid process 1788 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
61e74fd8ef830_Tue23593425095.execontrol.exedescription pid process target process PID 2948 wrote to memory of 380 2948 61e74fd8ef830_Tue23593425095.exe control.exe PID 2948 wrote to memory of 380 2948 61e74fd8ef830_Tue23593425095.exe control.exe PID 2948 wrote to memory of 380 2948 61e74fd8ef830_Tue23593425095.exe control.exe PID 380 wrote to memory of 1788 380 control.exe rundll32.exe PID 380 wrote to memory of 1788 380 control.exe rundll32.exe PID 380 wrote to memory of 1788 380 control.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd8ef830_Tue23593425095.exe"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd8ef830_Tue23593425095.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\G1V6MSEY.nr2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\G1V6MSEY.nr3⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\G1V6MSEY.nrMD5
e250cf99f94031b3d8c0305c471e3717
SHA18bb2e1684d15e45248d80631b569e6540fbd226b
SHA256e0bc5b8c8419c6bab462eec5e09d347d9a42bbacbb828a9a8fdcc96997b15ff9
SHA512793b9508464ef62b4032b32d4922a9c3e216194cc59148a7cf3d00c48dc9385e10057053cb5fa6d2f748a81bc16c044eb36ed8b9c817c3ffbcc9b26fbf4dbea2
-
C:\Users\Admin\AppData\Local\Temp\G1V6MSEY.nrMD5
62a5a318f21725b7b94e0a0ae4989ae6
SHA1ba7307c158674490624eb4d5bdc67a122b9a062b
SHA25635bc8e8ad44fbdd5e066ccd6ef624b4becc1dd4b43e69044c87bea07734e7a73
SHA512ad135638f1272a1b550d564ce524c6c2a77f689e09966b14292f47689507f3affc756c5c70d46c7b8dc78a870248d4b28c7273ea307bb61df59214f0716b79e4
-
C:\Users\Admin\AppData\Local\Temp\G1V6MSEY.nrMD5
7893178a9130994186ac03ec644aa105
SHA1ec0a3626cd9a80f2cac5609ba1bcc1e9c6a01981
SHA256f72fb975eca58dad4d9cb76a3fe7d3e497c89894664c53ec1b6639917a96a58d
SHA512c72e4328ecbcf342d46ab015d4f2e8a88fbfff3308942bcdb73578020d7a25517e15114ee40fd93654b06124c71dc507050c8a6c362518ca20baf9985883c3b1
-
memory/1788-135-0x0000000004E40000-0x000000002F889000-memory.dmpFilesize
682.3MB