Analysis
-
max time kernel
159s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-06-2022 05:21
Static task
static1
Behavioral task
behavioral1
Sample
19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe
Resource
win10v2004-20220414-en
General
-
Target
19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe
-
Size
142KB
-
MD5
70780b64e4a6d98605af8971d4c087ea
-
SHA1
862b12cfea6bf1c5e636f58e8bcdaf89482c94af
-
SHA256
19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf
-
SHA512
cbdfdf35c0f31aaf4870709aa07c3c93edf8c5b504d39f44838e9ffc4d7eeee3483e9c3a6c98a92d1fcdbb3e0e585127f0635c535575faa2509f9dbd54ac3950
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
vsdpjko.exepid process 1480 vsdpjko.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\hfveucfb\ImagePath = "C:\\Windows\\SysWOW64\\hfveucfb\\vsdpjko.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
vsdpjko.exedescription pid process target process PID 1480 set thread context of 4368 1480 vsdpjko.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 4376 sc.exe 4464 sc.exe 4404 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exevsdpjko.exedescription pid process target process PID 1692 wrote to memory of 680 1692 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe cmd.exe PID 1692 wrote to memory of 680 1692 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe cmd.exe PID 1692 wrote to memory of 680 1692 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe cmd.exe PID 1692 wrote to memory of 3580 1692 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe cmd.exe PID 1692 wrote to memory of 3580 1692 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe cmd.exe PID 1692 wrote to memory of 3580 1692 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe cmd.exe PID 1692 wrote to memory of 4376 1692 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe sc.exe PID 1692 wrote to memory of 4376 1692 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe sc.exe PID 1692 wrote to memory of 4376 1692 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe sc.exe PID 1692 wrote to memory of 4464 1692 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe sc.exe PID 1692 wrote to memory of 4464 1692 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe sc.exe PID 1692 wrote to memory of 4464 1692 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe sc.exe PID 1692 wrote to memory of 4404 1692 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe sc.exe PID 1692 wrote to memory of 4404 1692 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe sc.exe PID 1692 wrote to memory of 4404 1692 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe sc.exe PID 1692 wrote to memory of 3644 1692 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe netsh.exe PID 1692 wrote to memory of 3644 1692 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe netsh.exe PID 1692 wrote to memory of 3644 1692 19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe netsh.exe PID 1480 wrote to memory of 4368 1480 vsdpjko.exe svchost.exe PID 1480 wrote to memory of 4368 1480 vsdpjko.exe svchost.exe PID 1480 wrote to memory of 4368 1480 vsdpjko.exe svchost.exe PID 1480 wrote to memory of 4368 1480 vsdpjko.exe svchost.exe PID 1480 wrote to memory of 4368 1480 vsdpjko.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe"C:\Users\Admin\AppData\Local\Temp\19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\hfveucfb\2⤵PID:680
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\vsdpjko.exe" C:\Windows\SysWOW64\hfveucfb\2⤵PID:3580
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create hfveucfb binPath= "C:\Windows\SysWOW64\hfveucfb\vsdpjko.exe /d\"C:\Users\Admin\AppData\Local\Temp\19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:4376
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description hfveucfb "wifi internet conection"2⤵
- Launches sc.exe
PID:4464
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start hfveucfb2⤵
- Launches sc.exe
PID:4404
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:3644
-
-
C:\Windows\SysWOW64\hfveucfb\vsdpjko.exeC:\Windows\SysWOW64\hfveucfb\vsdpjko.exe /d"C:\Users\Admin\AppData\Local\Temp\19cd7ad7229f202403df4755e341f3b8856150a773217ea70fe7c8be52ad8fcf.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
PID:4368
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.5MB
MD51d7d230ddc3ffa0ee76c5a61032dd335
SHA1a11c865b33ca5fa753bb3412556694a81d0343d7
SHA2567ea4d9fdcd21a7561e650ee979a6407e1f4078faf58a1ac83d5b0b5a88826da3
SHA51280fa23502a6d113cc432335604bb834d4de48429b66a8d374f0942a0391ac1fc9b0bd0b136f1faf1563724951ffaa95d2295f4a7870069ad74cc2fb0c10fcd0b
-
Filesize
10.5MB
MD51d7d230ddc3ffa0ee76c5a61032dd335
SHA1a11c865b33ca5fa753bb3412556694a81d0343d7
SHA2567ea4d9fdcd21a7561e650ee979a6407e1f4078faf58a1ac83d5b0b5a88826da3
SHA51280fa23502a6d113cc432335604bb834d4de48429b66a8d374f0942a0391ac1fc9b0bd0b136f1faf1563724951ffaa95d2295f4a7870069ad74cc2fb0c10fcd0b