Overview
overview
3Static
static
1bios.rar
windows7-x64
3bios.rar
windows10-2004-x64
3bios/SCPH-...20.bin
windows7-x64
3bios/SCPH-...20.bin
windows10-2004-x64
3bios/SCPH-...0.erom
windows7-x64
3bios/SCPH-...0.erom
windows10-2004-x64
3bios/SCPH-...20.nvm
windows7-x64
3bios/SCPH-...20.nvm
windows10-2004-x64
3bios/SCPH-...0.rom1
windows7-x64
3bios/SCPH-...0.rom1
windows10-2004-x64
3bios/SCPH-...0.rom2
windows7-x64
3bios/SCPH-...0.rom2
windows10-2004-x64
3bios/SCPH-...0.diff
windows7-x64
3bios/SCPH-...0.diff
windows10-2004-x64
3bios/SCPH-...20.mec
windows7-x64
3bios/SCPH-...20.mec
windows10-2004-x64
3bios/SCPH-...20.nvm
windows7-x64
3bios/SCPH-...20.nvm
windows10-2004-x64
3bios/SCPH-...0.rom0
windows7-x64
3bios/SCPH-...0.rom0
windows10-2004-x64
3bios/SCPH-...0.rom1
windows7-x64
3bios/SCPH-...0.rom1
windows10-2004-x64
3bios/SCPH-...2].mec
windows7-x64
3bios/SCPH-...2].mec
windows10-2004-x64
3bios/SCPH-...2].nvm
windows7-x64
3bios/SCPH-...2].nvm
windows10-2004-x64
3bios/SCPH-...].rom0
windows7-x64
3bios/SCPH-...].rom0
windows10-2004-x64
3bios/SCPH-...].rom1
windows7-x64
3bios/SCPH-...].rom1
windows10-2004-x64
3bios/SCPH-...3].nvm
windows7-x64
3bios/SCPH-...3].nvm
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
25/03/2023, 23:40
Static task
static1
Behavioral task
behavioral1
Sample
bios.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bios.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
bios/SCPH-77000_BIOS_V15_JAP_220.bin
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
bios/SCPH-77000_BIOS_V15_JAP_220.bin
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
bios/SCPH-77000_BIOS_V15_JAP_220.erom
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
bios/SCPH-77000_BIOS_V15_JAP_220.erom
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
bios/SCPH-77000_BIOS_V15_JAP_220.nvm
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
bios/SCPH-77000_BIOS_V15_JAP_220.nvm
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
bios/SCPH-77000_BIOS_V15_JAP_220.rom1
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
bios/SCPH-77000_BIOS_V15_JAP_220.rom1
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
bios/SCPH-77000_BIOS_V15_JAP_220.rom2
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
bios/SCPH-77000_BIOS_V15_JAP_220.rom2
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
bios/SCPH-77001_BIOS_V15_USA_220.diff
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
bios/SCPH-77001_BIOS_V15_USA_220.diff
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
bios/SCPH-77001_BIOS_V15_USA_220.mec
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
bios/SCPH-77001_BIOS_V15_USA_220.mec
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
bios/SCPH-77001_BIOS_V15_USA_220.nvm
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
bios/SCPH-77001_BIOS_V15_USA_220.nvm
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
bios/SCPH-77001_BIOS_V15_USA_220.rom0
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
bios/SCPH-77001_BIOS_V15_USA_220.rom0
Resource
win10v2004-20230221-en
Behavioral task
behavioral21
Sample
bios/SCPH-77001_BIOS_V15_USA_220.rom1
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
bios/SCPH-77001_BIOS_V15_USA_220.rom1
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
bios/SCPH-77001_USA_Con_0220_20060210_v15_[026F6FE2].mec
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
bios/SCPH-77001_USA_Con_0220_20060210_v15_[026F6FE2].mec
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
bios/SCPH-77001_USA_Con_0220_20060210_v15_[026F6FE2].nvm
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
bios/SCPH-77001_USA_Con_0220_20060210_v15_[026F6FE2].nvm
Resource
win10v2004-20230221-en
Behavioral task
behavioral27
Sample
bios/SCPH-77001_USA_Con_0220_20060210_v15_[026F6FE2].rom0
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
bios/SCPH-77001_USA_Con_0220_20060210_v15_[026F6FE2].rom0
Resource
win10v2004-20230220-en
Behavioral task
behavioral29
Sample
bios/SCPH-77001_USA_Con_0220_20060210_v15_[33BDFC9C].rom1
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
bios/SCPH-77001_USA_Con_0220_20060210_v15_[33BDFC9C].rom1
Resource
win10v2004-20230220-en
Behavioral task
behavioral31
Sample
bios/SCPH-77001_USA_Con_0220_20060210_v15_[3DDD54C3].nvm
Resource
win7-20230220-en
Behavioral task
behavioral32
Sample
bios/SCPH-77001_USA_Con_0220_20060210_v15_[3DDD54C3].nvm
Resource
win10v2004-20230221-en
General
-
Target
bios/SCPH-77001_USA_Con_0220_20060210_v15_[33BDFC9C].rom1
-
Size
4.0MB
-
MD5
79b4880006769a1af9b0a6c7302cc18d
-
SHA1
747e36b086aceceb300c72c0d1bbab38e2920e63
-
SHA256
98da02e0b2d264a438b4c3a918dd533641dcd9363e902413d1f424b0dbd2deb9
-
SHA512
bf667aca51496c205263da3a2a8ad269d1d2a2a139ef292fb61c178bf154fdbf00b148d2205cb53341b54434427c20983ea13857507263eb388e6975eb807f62
-
SSDEEP
98304:J1IAIIIEINIgIwILIhk0Ay07JuVHQgAaCbpuHqwV6qwVndGo2oipEjo2OkG:Jh0AhUHPAa2uH76qGn7UI+
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\.rom1\ = "rom1_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\rom1_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\rom1_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\rom1_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\rom1_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\rom1_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\.rom1 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\rom1_auto_file\shell\Read rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1916 AcroRd32.exe 1916 AcroRd32.exe 1916 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1316 wrote to memory of 1044 1316 cmd.exe 29 PID 1316 wrote to memory of 1044 1316 cmd.exe 29 PID 1316 wrote to memory of 1044 1316 cmd.exe 29 PID 1044 wrote to memory of 1916 1044 rundll32.exe 30 PID 1044 wrote to memory of 1916 1044 rundll32.exe 30 PID 1044 wrote to memory of 1916 1044 rundll32.exe 30 PID 1044 wrote to memory of 1916 1044 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\bios\SCPH-77001_USA_Con_0220_20060210_v15_[33BDFC9C].rom11⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bios\SCPH-77001_USA_Con_0220_20060210_v15_[33BDFC9C].rom12⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bios\SCPH-77001_USA_Con_0220_20060210_v15_[33BDFC9C].rom1"3⤵
- Suspicious use of SetWindowsHookEx
PID:1916
-
-