Overview
overview
10Static
static
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.ps1
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.msi
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.ps1
windows10-2004-x64
10Ransomware...KB.exe
windows10-2004-x64
8Ransomware...KB.exe
windows10-2004-x64
10Resubmissions
28-07-2024 16:38
240728-t5tryssgmm 1007-07-2024 14:07
240707-rfgd8atekm 1007-07-2024 14:07
240707-re689awdpe 1013-09-2022 17:54
220913-wg1lpsgbg7 10Analysis
-
max time kernel
1540s -
max time network
1556s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2022 17:54
Static task
static1
Behavioral task
behavioral1
Sample
RansomwareSamples/Babuk_20_04_2021_79KB.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral2
Sample
RansomwareSamples/BlackKingdom_23_03_2021_12460KB.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
RansomwareSamples/BlackMatter_02_08_2021_67KB.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral4
Sample
RansomwareSamples/Conti_22_12_2020_186KB.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
RansomwareSamples/Cuba_08_03_2021_1130KB.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral6
Sample
RansomwareSamples/DarkSide_01_05_2021_30KB.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
RansomwareSamples/DarkSide_16_01_2021_59KB.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral8
Sample
RansomwareSamples/DarkSide_18_11_2020_17KB.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
RansomwareSamples/DearCry_13_03_2021_1292KB.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral10
Sample
RansomwareSamples/Hades_29_03_2021_1909KB.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
RansomwareSamples/Hive_17_07_2021_808KB.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral12
Sample
RansomwareSamples/LockBit_14_02_2021_146KB.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral13
Sample
RansomwareSamples/MAKOP_27_10_2020_115KB.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral14
Sample
RansomwareSamples/MedusaLocker_24_04_2020_661KB.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
RansomwareSamples/MountLocker_20_11_2020_200KB.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral16
Sample
RansomwareSamples/Nefilim_31_08_2020_3061KB.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
RansomwareSamples/Nemty_03_02_2021_124KB.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral18
Sample
RansomwareSamples/NetWalker_19_10_2020_903KB.ps1
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
RansomwareSamples/Phoenix_29_03_2021_1930KB.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral20
Sample
RansomwareSamples/PwndLocker_04_03_2020_17KB.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
RansomwareSamples/Pysa_08_04_2021_500KB.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral22
Sample
RansomwareSamples/REvil_07_04_2021_121KB.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
RansomwareSamples/REvil_08_04_2021_121KB.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral24
Sample
RansomwareSamples/Ragnar_11_02_2020_40KB.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
RansomwareSamples/RansomEXX_14_12_2020_156KB.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral26
Sample
RansomwareSamples/Ranzy_20_11_2020_138KB.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral27
Sample
RansomwareSamples/Ryuk_21_03_2021_274KB.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral28
Sample
RansomwareSamples/Sekhmet_30_03_2020_364KB.msi
Resource
win10v2004-20220812-en
Behavioral task
behavioral29
Sample
RansomwareSamples/Sodinokibi_04_07_2019_253KB.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral30
Sample
RansomwareSamples/SunCrypt_26_01_2021_1422KB.ps1
Resource
win10v2004-20220901-en
Behavioral task
behavioral31
Sample
RansomwareSamples/Thanos_23_03_2021_91KB.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral32
Sample
RansomwareSamples/Zeppelin_08_03_2021_813KB.exe
Resource
win10v2004-20220812-en
General
-
Target
RansomwareSamples/Phoenix_29_03_2021_1930KB.exe
-
Size
1.9MB
-
MD5
d86f451bbff804e59a549f9fb33d6e3f
-
SHA1
3cb0cb07cc2542f1d98060adccda726ea865db98
-
SHA256
008ec79765325200361d9c93ac35edd430f8b17894ff843268caa5acd6224549
-
SHA512
c86ad7e1d5c445d4de9866faab578b2eb04f72ffef4fac380b7164003471b4b48b09772e735ea15205e2ab4a1f4d194d188cdeb12c7199d0824ddaba393dcaa2
-
SSDEEP
49152:olyGDEemRoq2KKpgL5lWKDFcmjkf8cudB/8WjM:UYerFq/FgUcuf/85
Malware Config
Signatures
-
Hades Ransomware
Ransomware family attributed to Evil Corp APT first seen in late 2020.
-
Hades payload 2 IoCs
Processes:
resource yara_rule behavioral19/memory/5084-132-0x0000000140000000-0x00000001401E4000-memory.dmp family_hades behavioral19/memory/3456-139-0x0000000140000000-0x00000001401E4000-memory.dmp family_hades -
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\RouterAmsi\Service cryptone C:\Users\Admin\AppData\Roaming\RouterAmsi\Service cryptone -
Executes dropped EXE 1 IoCs
Processes:
Servicepid process 3456 Service -
Modifies extensions of user files 16 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
Servicedescription ioc process File renamed C:\Users\Admin\Pictures\CompareSkip.png => C:\Users\Admin\Pictures\CompareSkip.png.phoenix Service File opened for modification C:\Users\Admin\Pictures\CompareSkip.png.phoenix Service File renamed C:\Users\Admin\Pictures\CompleteSync.png => C:\Users\Admin\Pictures\CompleteSync.png.phoenix Service File renamed C:\Users\Admin\Pictures\CloseInvoke.crw => C:\Users\Admin\Pictures\CloseInvoke.crw.phoenix Service File opened for modification C:\Users\Admin\Pictures\CloseInvoke.crw.phoenix Service File opened for modification C:\Users\Admin\Pictures\CloseRedo.raw.phoenix Service File opened for modification C:\Users\Admin\Pictures\CompleteSync.png.phoenix Service File renamed C:\Users\Admin\Pictures\DisableWait.tif => C:\Users\Admin\Pictures\DisableWait.tif.phoenix Service File renamed C:\Users\Admin\Pictures\SwitchSplit.tiff => C:\Users\Admin\Pictures\SwitchSplit.tiff.phoenix Service File renamed C:\Users\Admin\Pictures\WaitExpand.png => C:\Users\Admin\Pictures\WaitExpand.png.phoenix Service File renamed C:\Users\Admin\Pictures\CloseRedo.raw => C:\Users\Admin\Pictures\CloseRedo.raw.phoenix Service File renamed C:\Users\Admin\Pictures\SkipMeasure.tiff => C:\Users\Admin\Pictures\SkipMeasure.tiff.phoenix Service File opened for modification C:\Users\Admin\Pictures\SkipMeasure.tiff.phoenix Service File opened for modification C:\Users\Admin\Pictures\SwitchSplit.tiff.phoenix Service File opened for modification C:\Users\Admin\Pictures\WaitExpand.png.phoenix Service File opened for modification C:\Users\Admin\Pictures\DisableWait.tif.phoenix Service -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
Phoenix_29_03_2021_1930KB.exeServicecmd.execmd.exedescription pid process target process PID 5084 wrote to memory of 3456 5084 Phoenix_29_03_2021_1930KB.exe Service PID 5084 wrote to memory of 3456 5084 Phoenix_29_03_2021_1930KB.exe Service PID 3456 wrote to memory of 1064 3456 Service cmd.exe PID 3456 wrote to memory of 1064 3456 Service cmd.exe PID 5084 wrote to memory of 1392 5084 Phoenix_29_03_2021_1930KB.exe cmd.exe PID 5084 wrote to memory of 1392 5084 Phoenix_29_03_2021_1930KB.exe cmd.exe PID 1064 wrote to memory of 4260 1064 cmd.exe waitfor.exe PID 1064 wrote to memory of 4260 1064 cmd.exe waitfor.exe PID 1392 wrote to memory of 3368 1392 cmd.exe waitfor.exe PID 1392 wrote to memory of 3368 1392 cmd.exe waitfor.exe PID 1064 wrote to memory of 1940 1064 cmd.exe attrib.exe PID 1064 wrote to memory of 1940 1064 cmd.exe attrib.exe PID 1392 wrote to memory of 1284 1392 cmd.exe attrib.exe PID 1392 wrote to memory of 1284 1392 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 1940 attrib.exe 1284 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\Phoenix_29_03_2021_1930KB.exe"C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\Phoenix_29_03_2021_1930KB.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Roaming\RouterAmsi\ServiceC:\Users\Admin\AppData\Roaming\RouterAmsi\Service /go2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SYSTEM32\cmd.execmd /c waitfor /t 10 pause /d y & attrib -h "C:\Users\Admin\AppData\Roaming\RouterAmsi\Service" & del "C:\Users\Admin\AppData\Roaming\RouterAmsi\Service" & rd "C:\Users\Admin\AppData\Roaming\RouterAmsi\"3⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\system32\waitfor.exewaitfor /t 10 pause /d y4⤵PID:4260
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\RouterAmsi\Service"4⤵
- Views/modifies file attributes
PID:1940
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c waitfor /t 10 pause /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\Phoenix_29_03_2021_1930KB.exe" & del "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\Phoenix_29_03_2021_1930KB.exe" & rd "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\"2⤵
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\system32\waitfor.exewaitfor /t 10 pause /d y3⤵PID:3368
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\Phoenix_29_03_2021_1930KB.exe"3⤵
- Views/modifies file attributes
PID:1284
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5d86f451bbff804e59a549f9fb33d6e3f
SHA13cb0cb07cc2542f1d98060adccda726ea865db98
SHA256008ec79765325200361d9c93ac35edd430f8b17894ff843268caa5acd6224549
SHA512c86ad7e1d5c445d4de9866faab578b2eb04f72ffef4fac380b7164003471b4b48b09772e735ea15205e2ab4a1f4d194d188cdeb12c7199d0824ddaba393dcaa2
-
Filesize
1.9MB
MD5d86f451bbff804e59a549f9fb33d6e3f
SHA13cb0cb07cc2542f1d98060adccda726ea865db98
SHA256008ec79765325200361d9c93ac35edd430f8b17894ff843268caa5acd6224549
SHA512c86ad7e1d5c445d4de9866faab578b2eb04f72ffef4fac380b7164003471b4b48b09772e735ea15205e2ab4a1f4d194d188cdeb12c7199d0824ddaba393dcaa2