Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-06-2022 22:22
Static task
static1
Behavioral task
behavioral1
Sample
1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exe
Resource
win10v2004-20220414-en
General
-
Target
1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exe
-
Size
328KB
-
MD5
1a848d9da35b7e5d8faa66c836e94861
-
SHA1
f161a407f9e3fecf8d1739cc841f2376db566c5d
-
SHA256
1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb
-
SHA512
f1cef77fc5781c9e4ce15d5e2ffce9f658446f8bbab98a107e994fa701b73f5616b4d710cc1e33362d5b46f907c6efa4bc56c7d34f9105c80336b14e34b323d5
Malware Config
Extracted
tofsee
103.232.222.57
111.121.193.242
123.249.0.22
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
rwvypdhi.exepid process 2184 rwvypdhi.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation 1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\rwvypdhi.exe\"" 1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rwvypdhi.exedescription pid process target process PID 2184 set thread context of 324 2184 rwvypdhi.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3764 324 WerFault.exe svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exerwvypdhi.exepid process 5100 1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exe 2184 rwvypdhi.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exerwvypdhi.exedescription pid process target process PID 5100 wrote to memory of 2184 5100 1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exe rwvypdhi.exe PID 5100 wrote to memory of 2184 5100 1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exe rwvypdhi.exe PID 5100 wrote to memory of 2184 5100 1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exe rwvypdhi.exe PID 5100 wrote to memory of 620 5100 1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exe cmd.exe PID 5100 wrote to memory of 620 5100 1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exe cmd.exe PID 5100 wrote to memory of 620 5100 1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exe cmd.exe PID 2184 wrote to memory of 324 2184 rwvypdhi.exe svchost.exe PID 2184 wrote to memory of 324 2184 rwvypdhi.exe svchost.exe PID 2184 wrote to memory of 324 2184 rwvypdhi.exe svchost.exe PID 2184 wrote to memory of 324 2184 rwvypdhi.exe svchost.exe PID 2184 wrote to memory of 324 2184 rwvypdhi.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exe"C:\Users\Admin\AppData\Local\Temp\1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\rwvypdhi.exe"C:\Users\Admin\rwvypdhi.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 324 -s 4684⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1824.bat" "2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 324 -ip 3241⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1824.batFilesize
302B
MD5ad8a39db533146344ee56f738b4e0c40
SHA11602080d8bd489b7d1ff65c29d5536290baf02dc
SHA2566ec0e89a579357ae4b26bc4ab8f81467a6ee9662492be5ef72fc172c26ca4fc7
SHA5122e154e3c6849b094b3e335119883e8ae6edb898997f02856af7e608fc9a1257e4d8925a264bb0acc4bbca8eecaf0bd2daadf5357716a9d1e06ff68a5cd763698
-
C:\Users\Admin\rwvypdhi.exeFilesize
32.7MB
MD5107bf2cd4e4fc136ce38b438bc146a15
SHA1dbde9534073970030ca506a5b092c39b166ce76b
SHA2560e29063b266a2b4c6b850336082e7504891e81db72bc2676e49fbc926dc7bb19
SHA5124c3dafb8333d64f8320d8c3cf53910e79f42931456a1b42c1fb87fa3736325ef9b9ecf6a2d2123a0a53595ee019c682281a39046d68744e69c5d3793431b913d
-
C:\Users\Admin\rwvypdhi.exeFilesize
32.7MB
MD5107bf2cd4e4fc136ce38b438bc146a15
SHA1dbde9534073970030ca506a5b092c39b166ce76b
SHA2560e29063b266a2b4c6b850336082e7504891e81db72bc2676e49fbc926dc7bb19
SHA5124c3dafb8333d64f8320d8c3cf53910e79f42931456a1b42c1fb87fa3736325ef9b9ecf6a2d2123a0a53595ee019c682281a39046d68744e69c5d3793431b913d
-
memory/324-156-0x00000000009A0000-0x00000000009B2000-memory.dmpFilesize
72KB
-
memory/324-155-0x0000000000000000-mapping.dmp
-
memory/324-161-0x00000000009A0000-0x00000000009B2000-memory.dmpFilesize
72KB
-
memory/324-162-0x00000000009A0000-0x00000000009B2000-memory.dmpFilesize
72KB
-
memory/620-147-0x0000000000000000-mapping.dmp
-
memory/2184-141-0x0000000000000000-mapping.dmp
-
memory/2184-159-0x00000000028D1000-0x00000000028D6000-memory.dmpFilesize
20KB
-
memory/2184-160-0x0000000074C90000-0x0000000074DED000-memory.dmpFilesize
1.4MB
-
memory/5100-146-0x0000000074C90000-0x0000000074DED000-memory.dmpFilesize
1.4MB
-
memory/5100-148-0x0000000074C90000-0x0000000074DED000-memory.dmpFilesize
1.4MB
-
memory/5100-137-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/5100-135-0x0000000002CC1000-0x0000000002CC6000-memory.dmpFilesize
20KB