Analysis
-
max time kernel
142s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-06-2022 20:38
Static task
static1
Behavioral task
behavioral1
Sample
1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe
Resource
win10v2004-20220414-en
General
-
Target
1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe
-
Size
143KB
-
MD5
aad43b23811400fcc73d8c22b4420660
-
SHA1
a9230effebe05616919532d05e2506ed503bd422
-
SHA256
1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195
-
SHA512
b928c25bf1e18f45ff91ce307f90186724d4c750702459b3da9672794245488adcc1280132bf342ae76a5c9b1a6cdb9220ce26ae675b0591fc0da38917a29005
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
bsslvtft.exepid process 1396 bsslvtft.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\bdsiimjw\ImagePath = "C:\\Windows\\SysWOW64\\bdsiimjw\\bsslvtft.exe" svchost.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 1704 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bsslvtft.exedescription pid process target process PID 1396 set thread context of 1704 1396 bsslvtft.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 1060 sc.exe 1332 sc.exe 1780 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exebsslvtft.exedescription pid process target process PID 1640 wrote to memory of 912 1640 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe cmd.exe PID 1640 wrote to memory of 912 1640 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe cmd.exe PID 1640 wrote to memory of 912 1640 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe cmd.exe PID 1640 wrote to memory of 912 1640 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe cmd.exe PID 1640 wrote to memory of 1692 1640 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe cmd.exe PID 1640 wrote to memory of 1692 1640 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe cmd.exe PID 1640 wrote to memory of 1692 1640 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe cmd.exe PID 1640 wrote to memory of 1692 1640 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe cmd.exe PID 1640 wrote to memory of 1060 1640 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe sc.exe PID 1640 wrote to memory of 1060 1640 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe sc.exe PID 1640 wrote to memory of 1060 1640 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe sc.exe PID 1640 wrote to memory of 1060 1640 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe sc.exe PID 1640 wrote to memory of 1332 1640 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe sc.exe PID 1640 wrote to memory of 1332 1640 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe sc.exe PID 1640 wrote to memory of 1332 1640 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe sc.exe PID 1640 wrote to memory of 1332 1640 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe sc.exe PID 1640 wrote to memory of 1780 1640 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe sc.exe PID 1640 wrote to memory of 1780 1640 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe sc.exe PID 1640 wrote to memory of 1780 1640 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe sc.exe PID 1640 wrote to memory of 1780 1640 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe sc.exe PID 1640 wrote to memory of 1208 1640 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe netsh.exe PID 1640 wrote to memory of 1208 1640 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe netsh.exe PID 1640 wrote to memory of 1208 1640 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe netsh.exe PID 1640 wrote to memory of 1208 1640 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe netsh.exe PID 1396 wrote to memory of 1704 1396 bsslvtft.exe svchost.exe PID 1396 wrote to memory of 1704 1396 bsslvtft.exe svchost.exe PID 1396 wrote to memory of 1704 1396 bsslvtft.exe svchost.exe PID 1396 wrote to memory of 1704 1396 bsslvtft.exe svchost.exe PID 1396 wrote to memory of 1704 1396 bsslvtft.exe svchost.exe PID 1396 wrote to memory of 1704 1396 bsslvtft.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe"C:\Users\Admin\AppData\Local\Temp\1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\bdsiimjw\2⤵PID:912
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\bsslvtft.exe" C:\Windows\SysWOW64\bdsiimjw\2⤵PID:1692
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create bdsiimjw binPath= "C:\Windows\SysWOW64\bdsiimjw\bsslvtft.exe /d\"C:\Users\Admin\AppData\Local\Temp\1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:1060
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description bdsiimjw "wifi internet conection"2⤵
- Launches sc.exe
PID:1332
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start bdsiimjw2⤵
- Launches sc.exe
PID:1780
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:1208
-
-
C:\Windows\SysWOW64\bdsiimjw\bsslvtft.exeC:\Windows\SysWOW64\bdsiimjw\bsslvtft.exe /d"C:\Users\Admin\AppData\Local\Temp\1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:1704
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.8MB
MD565c26f1474ad1bbcbf2b71700ccab33c
SHA108be4c4a4b931bac2eae6983c93bd11d1a122190
SHA256f83977970e975c178d5e555d2da619aed416e6d65d6271d55857bdc8815928bf
SHA5127faeb9823f00a4a8db612aa0b1ed9f38a4045b85457d6a5998cf7635a95fece271efc1be37b12a0b261a6e737ba41695f12ecd6fc329fef08b07ae0acc6894b4
-
Filesize
12.8MB
MD565c26f1474ad1bbcbf2b71700ccab33c
SHA108be4c4a4b931bac2eae6983c93bd11d1a122190
SHA256f83977970e975c178d5e555d2da619aed416e6d65d6271d55857bdc8815928bf
SHA5127faeb9823f00a4a8db612aa0b1ed9f38a4045b85457d6a5998cf7635a95fece271efc1be37b12a0b261a6e737ba41695f12ecd6fc329fef08b07ae0acc6894b4