Overview
overview
10Static
static
107zS8A52FD1...f3.exe
windows7_x64
87zS8A52FD1...f3.exe
windows10-2004_x64
87zS8A52FD1...62.exe
windows7_x64
77zS8A52FD1...62.exe
windows10-2004_x64
77zS8A52FD1...9a.exe
windows7_x64
107zS8A52FD1...9a.exe
windows10-2004_x64
107zS8A52FD1...8a.exe
windows7_x64
107zS8A52FD1...8a.exe
windows10-2004_x64
107zS8A52FD1...f5.exe
windows7_x64
17zS8A52FD1...f5.exe
windows10-2004_x64
17zS8A52FD1...68.exe
windows7_x64
77zS8A52FD1...68.exe
windows10-2004_x64
77zS8A52FD1...41.exe
windows7_x64
77zS8A52FD1...41.exe
windows10-2004_x64
77zS8A52FD1...cd.exe
windows7_x64
87zS8A52FD1...cd.exe
windows10-2004_x64
87zS8A52FD1...71.exe
windows7_x64
57zS8A52FD1...71.exe
windows10-2004_x64
57zS8A52FD1...9c.exe
windows7_x64
107zS8A52FD1...9c.exe
windows10-2004_x64
107zS8A52FD1...0d.exe
windows7_x64
17zS8A52FD1...0d.exe
windows10-2004_x64
17zS8A52FD1...ff.exe
windows7_x64
107zS8A52FD1...ff.exe
windows10-2004_x64
107zS8A52FD1...68.exe
windows7_x64
107zS8A52FD1...68.exe
windows10-2004_x64
107zS8A52FD1...-1.dll
windows7_x64
37zS8A52FD1...-1.dll
windows10-2004_x64
37zS8A52FD1...-6.dll
windows7_x64
37zS8A52FD1...-6.dll
windows10-2004_x64
37zS8A52FD1...-1.dll
windows7_x64
17zS8A52FD1...-1.dll
windows10-2004_x64
1Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
09-06-2022 14:12
Behavioral task
behavioral1
Sample
7zS8A52FD1B/62a1ea227dc1c_17ee33ef3.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
7zS8A52FD1B/62a1ea227dc1c_17ee33ef3.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
7zS8A52FD1B/62a1ea23342ae_c77562.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
7zS8A52FD1B/62a1ea23342ae_c77562.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
7zS8A52FD1B/62a1ea23da745_6e68c9a.exe
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
7zS8A52FD1B/62a1ea23da745_6e68c9a.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
7zS8A52FD1B/62a1ea243386e_a4f8a5d8a.exe
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
7zS8A52FD1B/62a1ea243386e_a4f8a5d8a.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
7zS8A52FD1B/62a1ea2501f48_0371f5.exe
Resource
win7-20220414-en
Behavioral task
behavioral10
Sample
7zS8A52FD1B/62a1ea2501f48_0371f5.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral11
Sample
7zS8A52FD1B/62a1ea2a20759_b7a66dc968.exe
Resource
win7-20220414-en
Behavioral task
behavioral12
Sample
7zS8A52FD1B/62a1ea2a20759_b7a66dc968.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral13
Sample
7zS8A52FD1B/62a1ea2b65292_c4804f5141.exe
Resource
win7-20220414-en
Behavioral task
behavioral14
Sample
7zS8A52FD1B/62a1ea2b65292_c4804f5141.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral15
Sample
7zS8A52FD1B/62a1ea2d09364_3056ccd.exe
Resource
win7-20220414-en
Behavioral task
behavioral16
Sample
7zS8A52FD1B/62a1ea2d09364_3056ccd.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral17
Sample
7zS8A52FD1B/62a1ea2df066e_add786971.exe
Resource
win7-20220414-en
Behavioral task
behavioral18
Sample
7zS8A52FD1B/62a1ea2df066e_add786971.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral19
Sample
7zS8A52FD1B/62a1ea2f0beee_36a9ec29c.exe
Resource
win7-20220414-en
Behavioral task
behavioral20
Sample
7zS8A52FD1B/62a1ea2f0beee_36a9ec29c.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral21
Sample
7zS8A52FD1B/62a1ea2fb0309_1d35870d.exe
Resource
win7-20220414-en
Behavioral task
behavioral22
Sample
7zS8A52FD1B/62a1ea2fb0309_1d35870d.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral23
Sample
7zS8A52FD1B/62a1ea319013f_e64e1ff.exe
Resource
win7-20220414-en
Behavioral task
behavioral24
Sample
7zS8A52FD1B/62a1ea319013f_e64e1ff.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral25
Sample
7zS8A52FD1B/62a1ea3215fd5_67a668.exe
Resource
win7-20220414-en
Behavioral task
behavioral26
Sample
7zS8A52FD1B/62a1ea3215fd5_67a668.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral27
Sample
7zS8A52FD1B/libgcc_s_dw2-1.dll
Resource
win7-20220414-en
Behavioral task
behavioral28
Sample
7zS8A52FD1B/libgcc_s_dw2-1.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral29
Sample
7zS8A52FD1B/libstdc++-6.dll
Resource
win7-20220414-en
Behavioral task
behavioral30
Sample
7zS8A52FD1B/libstdc++-6.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral31
Sample
7zS8A52FD1B/libwinpthread-1.dll
Resource
win7-20220414-en
Behavioral task
behavioral32
Sample
7zS8A52FD1B/libwinpthread-1.dll
Resource
win10v2004-20220414-en
General
-
Target
7zS8A52FD1B/62a1ea2b65292_c4804f5141.exe
-
Size
288KB
-
MD5
f902561ae91aad8b234cddf38401cad1
-
SHA1
cc3e9aadce50c820f147b194ba558b2abf25c16b
-
SHA256
6bdf30e72d6f74a83a5ce0a84202aab030db0ffd61850fe9154eceaabc282e65
-
SHA512
c9170b3f855f2721c3f713776b65da69ac51ddf9109fa4a2bef18174ed96cbbb7c9faab5e57f44347a85d8a6b7d8e5958a23f4e19db5209fda4ea4860f5abd30
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
62a1ea2b65292_c4804f5141.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation 62a1ea2b65292_c4804f5141.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3412 2388 WerFault.exe 62a1ea2b65292_c4804f5141.exe 4596 2388 WerFault.exe 62a1ea2b65292_c4804f5141.exe 4824 2388 WerFault.exe 62a1ea2b65292_c4804f5141.exe 4268 2388 WerFault.exe 62a1ea2b65292_c4804f5141.exe 2064 2388 WerFault.exe 62a1ea2b65292_c4804f5141.exe 2052 2388 WerFault.exe 62a1ea2b65292_c4804f5141.exe 4580 2388 WerFault.exe 62a1ea2b65292_c4804f5141.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4564 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 4564 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
62a1ea2b65292_c4804f5141.execmd.exedescription pid process target process PID 2388 wrote to memory of 3744 2388 62a1ea2b65292_c4804f5141.exe cmd.exe PID 2388 wrote to memory of 3744 2388 62a1ea2b65292_c4804f5141.exe cmd.exe PID 2388 wrote to memory of 3744 2388 62a1ea2b65292_c4804f5141.exe cmd.exe PID 3744 wrote to memory of 4564 3744 cmd.exe taskkill.exe PID 3744 wrote to memory of 4564 3744 cmd.exe taskkill.exe PID 3744 wrote to memory of 4564 3744 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7zS8A52FD1B\62a1ea2b65292_c4804f5141.exe"C:\Users\Admin\AppData\Local\Temp\7zS8A52FD1B\62a1ea2b65292_c4804f5141.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 7362⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 7362⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 9002⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 9162⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 9562⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 9762⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "62a1ea2b65292_c4804f5141.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS8A52FD1B\62a1ea2b65292_c4804f5141.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "62a1ea2b65292_c4804f5141.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 7642⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2388 -ip 23881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2388 -ip 23881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2388 -ip 23881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2388 -ip 23881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2388 -ip 23881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2388 -ip 23881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2388 -ip 23881⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2388-130-0x0000000000B9D000-0x0000000000BC3000-memory.dmpFilesize
152KB
-
memory/2388-131-0x0000000000AB0000-0x0000000000AEF000-memory.dmpFilesize
252KB
-
memory/2388-132-0x0000000000400000-0x0000000000912000-memory.dmpFilesize
5.1MB
-
memory/2388-133-0x0000000000B9D000-0x0000000000BC3000-memory.dmpFilesize
152KB
-
memory/2388-134-0x0000000000AB0000-0x0000000000AEF000-memory.dmpFilesize
252KB
-
memory/2388-137-0x0000000000B9D000-0x0000000000BC3000-memory.dmpFilesize
152KB
-
memory/2388-138-0x0000000000400000-0x0000000000912000-memory.dmpFilesize
5.1MB
-
memory/3744-135-0x0000000000000000-mapping.dmp
-
memory/4564-136-0x0000000000000000-mapping.dmp