Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
04-06-2022 18:28
Static task
static1
Behavioral task
behavioral1
Sample
0e93b345b164d54c41d40ed86a860ec279c444a7dd809ae8fe31c12ed8848033.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0e93b345b164d54c41d40ed86a860ec279c444a7dd809ae8fe31c12ed8848033.exe
Resource
win10v2004-20220414-en
General
-
Target
0e93b345b164d54c41d40ed86a860ec279c444a7dd809ae8fe31c12ed8848033.exe
-
Size
196KB
-
MD5
371e8928f2518f19e3439a7f1870b6ce
-
SHA1
685d65f85a1e23324fa378f9301a36a52ace4759
-
SHA256
0e93b345b164d54c41d40ed86a860ec279c444a7dd809ae8fe31c12ed8848033
-
SHA512
32703ea0d84be57d5efda99d0a4746d1c4fb5e6a634d24fe8760b6bfbeb23141f34212ea4d17c35497635f2ee4b02aba482577b1f1f3cc872bce903c6604787e
Malware Config
Extracted
tofsee
103.232.222.57
111.121.193.242
123.249.0.22
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
zedgxlpq.exepid process 1388 zedgxlpq.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2020 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
0e93b345b164d54c41d40ed86a860ec279c444a7dd809ae8fe31c12ed8848033.exepid process 1548 0e93b345b164d54c41d40ed86a860ec279c444a7dd809ae8fe31c12ed8848033.exe 1548 0e93b345b164d54c41d40ed86a860ec279c444a7dd809ae8fe31c12ed8848033.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0e93b345b164d54c41d40ed86a860ec279c444a7dd809ae8fe31c12ed8848033.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\zedgxlpq.exe\"" 0e93b345b164d54c41d40ed86a860ec279c444a7dd809ae8fe31c12ed8848033.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
zedgxlpq.exedescription pid process target process PID 1388 set thread context of 992 1388 zedgxlpq.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
0e93b345b164d54c41d40ed86a860ec279c444a7dd809ae8fe31c12ed8848033.exezedgxlpq.exepid process 1548 0e93b345b164d54c41d40ed86a860ec279c444a7dd809ae8fe31c12ed8848033.exe 1388 zedgxlpq.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
0e93b345b164d54c41d40ed86a860ec279c444a7dd809ae8fe31c12ed8848033.exezedgxlpq.exepid process 1548 0e93b345b164d54c41d40ed86a860ec279c444a7dd809ae8fe31c12ed8848033.exe 1388 zedgxlpq.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
0e93b345b164d54c41d40ed86a860ec279c444a7dd809ae8fe31c12ed8848033.exezedgxlpq.exedescription pid process target process PID 1548 wrote to memory of 1388 1548 0e93b345b164d54c41d40ed86a860ec279c444a7dd809ae8fe31c12ed8848033.exe zedgxlpq.exe PID 1548 wrote to memory of 1388 1548 0e93b345b164d54c41d40ed86a860ec279c444a7dd809ae8fe31c12ed8848033.exe zedgxlpq.exe PID 1548 wrote to memory of 1388 1548 0e93b345b164d54c41d40ed86a860ec279c444a7dd809ae8fe31c12ed8848033.exe zedgxlpq.exe PID 1548 wrote to memory of 1388 1548 0e93b345b164d54c41d40ed86a860ec279c444a7dd809ae8fe31c12ed8848033.exe zedgxlpq.exe PID 1548 wrote to memory of 2020 1548 0e93b345b164d54c41d40ed86a860ec279c444a7dd809ae8fe31c12ed8848033.exe cmd.exe PID 1548 wrote to memory of 2020 1548 0e93b345b164d54c41d40ed86a860ec279c444a7dd809ae8fe31c12ed8848033.exe cmd.exe PID 1548 wrote to memory of 2020 1548 0e93b345b164d54c41d40ed86a860ec279c444a7dd809ae8fe31c12ed8848033.exe cmd.exe PID 1548 wrote to memory of 2020 1548 0e93b345b164d54c41d40ed86a860ec279c444a7dd809ae8fe31c12ed8848033.exe cmd.exe PID 1388 wrote to memory of 992 1388 zedgxlpq.exe svchost.exe PID 1388 wrote to memory of 992 1388 zedgxlpq.exe svchost.exe PID 1388 wrote to memory of 992 1388 zedgxlpq.exe svchost.exe PID 1388 wrote to memory of 992 1388 zedgxlpq.exe svchost.exe PID 1388 wrote to memory of 992 1388 zedgxlpq.exe svchost.exe PID 1388 wrote to memory of 992 1388 zedgxlpq.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e93b345b164d54c41d40ed86a860ec279c444a7dd809ae8fe31c12ed8848033.exe"C:\Users\Admin\AppData\Local\Temp\0e93b345b164d54c41d40ed86a860ec279c444a7dd809ae8fe31c12ed8848033.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\zedgxlpq.exe"C:\Users\Admin\zedgxlpq.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:992
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\4788.bat" "2⤵
- Deletes itself
PID:2020
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\4788.batFilesize
302B
MD56b9cf7f6462dc12c2356a6687b4c2317
SHA1ee40d8737db4d82a753d4c34585764fd4bcc6f35
SHA256f48a50912a2e2c9de41ae4e91a88374dd97e5d9ae04da0c525b2408a41faba70
SHA5123a306ba630df82d2fb0ae53886ade8931f3abfbb7f52d36d0541024f4a095e11226701aeef20682b37983e99ff8ed15c5f0e5fe3f87996edee1243bf0e6328af
-
C:\Users\Admin\zedgxlpq.exeFilesize
36.4MB
MD52fd0c7f0c8bcc56172c1650f40a6549f
SHA1c23616173edcf215f10aede512fa32df5f30c92b
SHA256f39840e0b87c4f73aa9715301d12b9384c979e448c287b7ec4cfbe3278ec81ab
SHA51207b8a7173da97da3839db6ae5aa7164324bdbd85bb22a5488f4522873a69a8e3690ecf01a303dafa88811ace1d00620cbdc7982d7625435cb1400d1c82fa18b2
-
C:\Users\Admin\zedgxlpq.exeFilesize
36.4MB
MD52fd0c7f0c8bcc56172c1650f40a6549f
SHA1c23616173edcf215f10aede512fa32df5f30c92b
SHA256f39840e0b87c4f73aa9715301d12b9384c979e448c287b7ec4cfbe3278ec81ab
SHA51207b8a7173da97da3839db6ae5aa7164324bdbd85bb22a5488f4522873a69a8e3690ecf01a303dafa88811ace1d00620cbdc7982d7625435cb1400d1c82fa18b2
-
\Users\Admin\zedgxlpq.exeFilesize
36.4MB
MD52fd0c7f0c8bcc56172c1650f40a6549f
SHA1c23616173edcf215f10aede512fa32df5f30c92b
SHA256f39840e0b87c4f73aa9715301d12b9384c979e448c287b7ec4cfbe3278ec81ab
SHA51207b8a7173da97da3839db6ae5aa7164324bdbd85bb22a5488f4522873a69a8e3690ecf01a303dafa88811ace1d00620cbdc7982d7625435cb1400d1c82fa18b2
-
\Users\Admin\zedgxlpq.exeFilesize
36.4MB
MD52fd0c7f0c8bcc56172c1650f40a6549f
SHA1c23616173edcf215f10aede512fa32df5f30c92b
SHA256f39840e0b87c4f73aa9715301d12b9384c979e448c287b7ec4cfbe3278ec81ab
SHA51207b8a7173da97da3839db6ae5aa7164324bdbd85bb22a5488f4522873a69a8e3690ecf01a303dafa88811ace1d00620cbdc7982d7625435cb1400d1c82fa18b2
-
memory/992-80-0x0000000000080000-0x0000000000092000-memory.dmpFilesize
72KB
-
memory/992-90-0x0000000000080000-0x0000000000092000-memory.dmpFilesize
72KB
-
memory/992-89-0x0000000000080000-0x0000000000092000-memory.dmpFilesize
72KB
-
memory/992-87-0x0000000000080000-0x0000000000092000-memory.dmpFilesize
72KB
-
memory/992-83-0x000000000008782D-mapping.dmp
-
memory/992-82-0x0000000000080000-0x0000000000092000-memory.dmpFilesize
72KB
-
memory/1388-65-0x0000000000000000-mapping.dmp
-
memory/1388-76-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1388-85-0x0000000072940000-0x0000000072A93000-memory.dmpFilesize
1.3MB
-
memory/1388-69-0x0000000003011000-0x0000000003016000-memory.dmpFilesize
20KB
-
memory/1548-72-0x0000000072940000-0x0000000072A93000-memory.dmpFilesize
1.3MB
-
memory/1548-56-0x00000000031D1000-0x00000000031D6000-memory.dmpFilesize
20KB
-
memory/1548-59-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1548-57-0x00000000759E1000-0x00000000759E3000-memory.dmpFilesize
8KB
-
memory/2020-71-0x0000000000000000-mapping.dmp