Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-06-2022 20:38
Static task
static1
Behavioral task
behavioral1
Sample
1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe
Resource
win10v2004-20220414-en
General
-
Target
1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe
-
Size
143KB
-
MD5
aad43b23811400fcc73d8c22b4420660
-
SHA1
a9230effebe05616919532d05e2506ed503bd422
-
SHA256
1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195
-
SHA512
b928c25bf1e18f45ff91ce307f90186724d4c750702459b3da9672794245488adcc1280132bf342ae76a5c9b1a6cdb9220ce26ae675b0591fc0da38917a29005
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
eguvjrtd.exepid process 4552 eguvjrtd.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\vzsnnbjk\ImagePath = "C:\\Windows\\SysWOW64\\vzsnnbjk\\eguvjrtd.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
eguvjrtd.exedescription pid process target process PID 4552 set thread context of 3048 4552 eguvjrtd.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 1956 sc.exe 1776 sc.exe 4216 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exeeguvjrtd.exedescription pid process target process PID 5016 wrote to memory of 2472 5016 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe cmd.exe PID 5016 wrote to memory of 2472 5016 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe cmd.exe PID 5016 wrote to memory of 2472 5016 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe cmd.exe PID 5016 wrote to memory of 3208 5016 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe cmd.exe PID 5016 wrote to memory of 3208 5016 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe cmd.exe PID 5016 wrote to memory of 3208 5016 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe cmd.exe PID 5016 wrote to memory of 1956 5016 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe sc.exe PID 5016 wrote to memory of 1956 5016 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe sc.exe PID 5016 wrote to memory of 1956 5016 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe sc.exe PID 5016 wrote to memory of 1776 5016 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe sc.exe PID 5016 wrote to memory of 1776 5016 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe sc.exe PID 5016 wrote to memory of 1776 5016 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe sc.exe PID 5016 wrote to memory of 4216 5016 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe sc.exe PID 5016 wrote to memory of 4216 5016 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe sc.exe PID 5016 wrote to memory of 4216 5016 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe sc.exe PID 5016 wrote to memory of 3800 5016 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe netsh.exe PID 5016 wrote to memory of 3800 5016 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe netsh.exe PID 5016 wrote to memory of 3800 5016 1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe netsh.exe PID 4552 wrote to memory of 3048 4552 eguvjrtd.exe svchost.exe PID 4552 wrote to memory of 3048 4552 eguvjrtd.exe svchost.exe PID 4552 wrote to memory of 3048 4552 eguvjrtd.exe svchost.exe PID 4552 wrote to memory of 3048 4552 eguvjrtd.exe svchost.exe PID 4552 wrote to memory of 3048 4552 eguvjrtd.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe"C:\Users\Admin\AppData\Local\Temp\1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\vzsnnbjk\2⤵PID:2472
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\eguvjrtd.exe" C:\Windows\SysWOW64\vzsnnbjk\2⤵PID:3208
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create vzsnnbjk binPath= "C:\Windows\SysWOW64\vzsnnbjk\eguvjrtd.exe /d\"C:\Users\Admin\AppData\Local\Temp\1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:1956
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description vzsnnbjk "wifi internet conection"2⤵
- Launches sc.exe
PID:1776
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start vzsnnbjk2⤵
- Launches sc.exe
PID:4216
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:3800
-
-
C:\Windows\SysWOW64\vzsnnbjk\eguvjrtd.exeC:\Windows\SysWOW64\vzsnnbjk\eguvjrtd.exe /d"C:\Users\Admin\AppData\Local\Temp\1788c90e47e33020a545656cf59b5f557a93d90e449cd356d578309e71a5c195.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
PID:3048
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.4MB
MD5dcdfe1dc7fdd7759a15fcee0eefa78e2
SHA1427bd61139477334d54963341630ffb4dffe89c8
SHA2563c8c43f1b08f70537fb10e70aa02333c66213e654cf0e9ecc22a32991e3ed224
SHA5120b1c52e2eefc06181ca87b284f8585b48687fd97432aa46ee19602273468d5561c561e6db541710626e62449dadd8c138d790ad22253e627fc3033a4a45ac09e
-
Filesize
10.4MB
MD5dcdfe1dc7fdd7759a15fcee0eefa78e2
SHA1427bd61139477334d54963341630ffb4dffe89c8
SHA2563c8c43f1b08f70537fb10e70aa02333c66213e654cf0e9ecc22a32991e3ed224
SHA5120b1c52e2eefc06181ca87b284f8585b48687fd97432aa46ee19602273468d5561c561e6db541710626e62449dadd8c138d790ad22253e627fc3033a4a45ac09e