Overview
overview
10Static
static
107zS8A52FD1...f3.exe
windows7_x64
87zS8A52FD1...f3.exe
windows10-2004_x64
87zS8A52FD1...62.exe
windows7_x64
77zS8A52FD1...62.exe
windows10-2004_x64
77zS8A52FD1...9a.exe
windows7_x64
107zS8A52FD1...9a.exe
windows10-2004_x64
107zS8A52FD1...8a.exe
windows7_x64
107zS8A52FD1...8a.exe
windows10-2004_x64
107zS8A52FD1...f5.exe
windows7_x64
17zS8A52FD1...f5.exe
windows10-2004_x64
17zS8A52FD1...68.exe
windows7_x64
77zS8A52FD1...68.exe
windows10-2004_x64
77zS8A52FD1...41.exe
windows7_x64
77zS8A52FD1...41.exe
windows10-2004_x64
77zS8A52FD1...cd.exe
windows7_x64
87zS8A52FD1...cd.exe
windows10-2004_x64
87zS8A52FD1...71.exe
windows7_x64
57zS8A52FD1...71.exe
windows10-2004_x64
57zS8A52FD1...9c.exe
windows7_x64
107zS8A52FD1...9c.exe
windows10-2004_x64
107zS8A52FD1...0d.exe
windows7_x64
17zS8A52FD1...0d.exe
windows10-2004_x64
17zS8A52FD1...ff.exe
windows7_x64
107zS8A52FD1...ff.exe
windows10-2004_x64
107zS8A52FD1...68.exe
windows7_x64
107zS8A52FD1...68.exe
windows10-2004_x64
107zS8A52FD1...-1.dll
windows7_x64
37zS8A52FD1...-1.dll
windows10-2004_x64
37zS8A52FD1...-6.dll
windows7_x64
37zS8A52FD1...-6.dll
windows10-2004_x64
37zS8A52FD1...-1.dll
windows7_x64
17zS8A52FD1...-1.dll
windows10-2004_x64
1Analysis
-
max time kernel
149s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
09-06-2022 14:12
Behavioral task
behavioral1
Sample
7zS8A52FD1B/62a1ea227dc1c_17ee33ef3.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
7zS8A52FD1B/62a1ea227dc1c_17ee33ef3.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
7zS8A52FD1B/62a1ea23342ae_c77562.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
7zS8A52FD1B/62a1ea23342ae_c77562.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
7zS8A52FD1B/62a1ea23da745_6e68c9a.exe
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
7zS8A52FD1B/62a1ea23da745_6e68c9a.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
7zS8A52FD1B/62a1ea243386e_a4f8a5d8a.exe
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
7zS8A52FD1B/62a1ea243386e_a4f8a5d8a.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
7zS8A52FD1B/62a1ea2501f48_0371f5.exe
Resource
win7-20220414-en
Behavioral task
behavioral10
Sample
7zS8A52FD1B/62a1ea2501f48_0371f5.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral11
Sample
7zS8A52FD1B/62a1ea2a20759_b7a66dc968.exe
Resource
win7-20220414-en
Behavioral task
behavioral12
Sample
7zS8A52FD1B/62a1ea2a20759_b7a66dc968.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral13
Sample
7zS8A52FD1B/62a1ea2b65292_c4804f5141.exe
Resource
win7-20220414-en
Behavioral task
behavioral14
Sample
7zS8A52FD1B/62a1ea2b65292_c4804f5141.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral15
Sample
7zS8A52FD1B/62a1ea2d09364_3056ccd.exe
Resource
win7-20220414-en
Behavioral task
behavioral16
Sample
7zS8A52FD1B/62a1ea2d09364_3056ccd.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral17
Sample
7zS8A52FD1B/62a1ea2df066e_add786971.exe
Resource
win7-20220414-en
Behavioral task
behavioral18
Sample
7zS8A52FD1B/62a1ea2df066e_add786971.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral19
Sample
7zS8A52FD1B/62a1ea2f0beee_36a9ec29c.exe
Resource
win7-20220414-en
Behavioral task
behavioral20
Sample
7zS8A52FD1B/62a1ea2f0beee_36a9ec29c.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral21
Sample
7zS8A52FD1B/62a1ea2fb0309_1d35870d.exe
Resource
win7-20220414-en
Behavioral task
behavioral22
Sample
7zS8A52FD1B/62a1ea2fb0309_1d35870d.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral23
Sample
7zS8A52FD1B/62a1ea319013f_e64e1ff.exe
Resource
win7-20220414-en
Behavioral task
behavioral24
Sample
7zS8A52FD1B/62a1ea319013f_e64e1ff.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral25
Sample
7zS8A52FD1B/62a1ea3215fd5_67a668.exe
Resource
win7-20220414-en
Behavioral task
behavioral26
Sample
7zS8A52FD1B/62a1ea3215fd5_67a668.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral27
Sample
7zS8A52FD1B/libgcc_s_dw2-1.dll
Resource
win7-20220414-en
Behavioral task
behavioral28
Sample
7zS8A52FD1B/libgcc_s_dw2-1.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral29
Sample
7zS8A52FD1B/libstdc++-6.dll
Resource
win7-20220414-en
Behavioral task
behavioral30
Sample
7zS8A52FD1B/libstdc++-6.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral31
Sample
7zS8A52FD1B/libwinpthread-1.dll
Resource
win7-20220414-en
Behavioral task
behavioral32
Sample
7zS8A52FD1B/libwinpthread-1.dll
Resource
win10v2004-20220414-en
General
-
Target
7zS8A52FD1B/62a1ea2a20759_b7a66dc968.exe
-
Size
1.6MB
-
MD5
c4bc22a23300c3e7db1fae03e00610a5
-
SHA1
0f8d2471d510434d0338fa204c7863a5a6e17190
-
SHA256
d866f133333b259ea1aaaa838bd6f26a28798d440ce4531cd90b0497ea92d869
-
SHA512
fa629c9f18ff2cfd07c4da7065a544d84b4dc823c8b542863525eafcf9ad62a74f5f1fdbd6e1f0609135f258b0ffe01b136b614e8bd0d669d0a5ea4052bd3fc6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
62a1ea2a20759_b7a66dc968.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 62a1ea2a20759_b7a66dc968.exe -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exerundll32.exepid process 5048 rundll32.exe 5048 rundll32.exe 1600 rundll32.exe 1600 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
62a1ea2a20759_b7a66dc968.execontrol.exerundll32.exeRunDll32.exedescription pid process target process PID 5012 wrote to memory of 1920 5012 62a1ea2a20759_b7a66dc968.exe control.exe PID 5012 wrote to memory of 1920 5012 62a1ea2a20759_b7a66dc968.exe control.exe PID 5012 wrote to memory of 1920 5012 62a1ea2a20759_b7a66dc968.exe control.exe PID 1920 wrote to memory of 5048 1920 control.exe rundll32.exe PID 1920 wrote to memory of 5048 1920 control.exe rundll32.exe PID 1920 wrote to memory of 5048 1920 control.exe rundll32.exe PID 5048 wrote to memory of 216 5048 rundll32.exe RunDll32.exe PID 5048 wrote to memory of 216 5048 rundll32.exe RunDll32.exe PID 216 wrote to memory of 1600 216 RunDll32.exe rundll32.exe PID 216 wrote to memory of 1600 216 RunDll32.exe rundll32.exe PID 216 wrote to memory of 1600 216 RunDll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7zS8A52FD1B\62a1ea2a20759_b7a66dc968.exe"C:\Users\Admin\AppData\Local\Temp\7zS8A52FD1B\62a1ea2a20759_b7a66dc968.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\PHF_.hT2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\PHF_.hT3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\PHF_.hT4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\PHF_.hT5⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\PHF_.hTFilesize
137.9MB
MD5fa647e620799308b2d8eb2c74e0095eb
SHA1a949626be4e120ef64efbea14e712b34ca20f2f8
SHA256e93363796361f33d9dae8de45da84cbf7498414897630c29ebfdfce965df4fc8
SHA512c5b4535245051f5cc585a124d78b87e2536321fc51a1ca0b4df0057e8421b01f08e5b684b636ca2563305584d83991f7f8f4d79b3c6d4ea0154e42fb6b2083f9
-
C:\Users\Admin\AppData\Local\Temp\phF_.hTFilesize
132.4MB
MD55ba414c1d62fcaed282b9287cf60bc0f
SHA18a64c15271c11b11e30198f766d18efc31435c0b
SHA25625a72556d4856118a537928a145a71f1797da6853d921b38b372c01e28b0e8d1
SHA512a20482a220aee6b7f74eec33191278c089c2da4114814c44ee489bff798a9c2e7448fc08f25d5a5ef3d8236f0957c621880f262f1b456447d2eb3c6090573e9d
-
C:\Users\Admin\AppData\Local\Temp\phF_.hTFilesize
132.9MB
MD554e2b392025a0198d5f61559303cb3e5
SHA1dd92de59b3b3c2c4d28a2a5a1e4666a15ce0a845
SHA256d632ea3c517c6357fbc3af4266cfb5ba70fa773073d75dd37da75c19834cd090
SHA51249ff9dfe46782e923b0d4c51431eb71a5a36137e757938b93fdaa2c3a8c3fa53b160b69f89866d618b28240e392a9ff87aa4209873484a8457b73428275841ca
-
C:\Users\Admin\AppData\Local\Temp\phF_.hTFilesize
96.3MB
MD5cc031e99c0e4f71958de3a96d9568902
SHA1cb75e3bf9431dc1e548a4d5538a5613b3feb6275
SHA256f2645aa9c7325aa682063711bd701930b6f6dcfe1c8b67ec74f800271a2078a2
SHA512ee244d2a13d4c618bcf84980cd59e4e80f412b419c598fce23064fd9d03c74ef97d8c6d2e35858bf7f936f7b1432863e376e6bc108bae31afd03c736cc9ceb4b
-
C:\Users\Admin\AppData\Local\Temp\phF_.hTFilesize
97.3MB
MD55d22b49bdb01bc37eb3f6bb672c91814
SHA1a17d7c8835617f8f8b45db7b53de50d835f6f9b2
SHA2562e11408aba222e73dc538341fc793a6aaf11644109221cea7a8858f264166d19
SHA5124886ca37f2517c72d4f63afdb0e1f3f8084d192762d59b5f7522517b30fe36155574520b30fef14fc2840d2e895c89251f9f958127f2acea5dc6f4dfab9d50cc
-
memory/216-142-0x0000000000000000-mapping.dmp
-
memory/1600-151-0x000000002E050000-0x000000002E0F1000-memory.dmpFilesize
644KB
-
memory/1600-149-0x000000002DF90000-0x000000002E046000-memory.dmpFilesize
728KB
-
memory/1600-148-0x000000002DED0000-0x000000002DF8C000-memory.dmpFilesize
752KB
-
memory/1600-147-0x000000002DD50000-0x000000002DE0D000-memory.dmpFilesize
756KB
-
memory/1600-146-0x0000000003170000-0x0000000004170000-memory.dmpFilesize
16.0MB
-
memory/1600-143-0x0000000000000000-mapping.dmp
-
memory/1600-153-0x000000002DED0000-0x000000002DF8C000-memory.dmpFilesize
752KB
-
memory/1920-130-0x0000000000000000-mapping.dmp
-
memory/5048-135-0x0000000002630000-0x0000000003630000-memory.dmpFilesize
16.0MB
-
memory/5048-140-0x000000002D4A0000-0x000000002D541000-memory.dmpFilesize
644KB
-
memory/5048-139-0x000000002D4A0000-0x000000002D541000-memory.dmpFilesize
644KB
-
memory/5048-138-0x000000002D3E0000-0x000000002D496000-memory.dmpFilesize
728KB
-
memory/5048-137-0x000000002D320000-0x000000002D3DC000-memory.dmpFilesize
752KB
-
memory/5048-136-0x000000002D1A0000-0x000000002D25D000-memory.dmpFilesize
756KB
-
memory/5048-131-0x0000000000000000-mapping.dmp
-
memory/5048-154-0x000000002D320000-0x000000002D3DC000-memory.dmpFilesize
752KB