Analysis
-
max time kernel
187s -
max time network
206s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
11-06-2022 21:39
Static task
static1
Behavioral task
behavioral1
Sample
24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe
Resource
win10v2004-20220414-en
General
-
Target
24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe
-
Size
137KB
-
MD5
911c4ae779e7af73f21e1afdfeb951f1
-
SHA1
bc95d722e615b2862ffbd745944ac1dafa189943
-
SHA256
24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916
-
SHA512
97901a6f794124dd67ffcc1e0e97c4639b8b35ab8ed15ad249a35a8eb82491bc50283c58e94dad8d5efd6550f0ac0364b89c34ad1a91c4e90f5755956dd04cbd
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
ycjtthrn.exepid process 1488 ycjtthrn.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\gwbsdvmy\ImagePath = "C:\\Windows\\SysWOW64\\gwbsdvmy\\ycjtthrn.exe" svchost.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 472 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ycjtthrn.exedescription pid process target process PID 1488 set thread context of 472 1488 ycjtthrn.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 108 sc.exe 524 sc.exe 1888 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exeycjtthrn.exedescription pid process target process PID 964 wrote to memory of 1060 964 24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe cmd.exe PID 964 wrote to memory of 1060 964 24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe cmd.exe PID 964 wrote to memory of 1060 964 24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe cmd.exe PID 964 wrote to memory of 1060 964 24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe cmd.exe PID 964 wrote to memory of 2028 964 24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe cmd.exe PID 964 wrote to memory of 2028 964 24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe cmd.exe PID 964 wrote to memory of 2028 964 24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe cmd.exe PID 964 wrote to memory of 2028 964 24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe cmd.exe PID 964 wrote to memory of 108 964 24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe sc.exe PID 964 wrote to memory of 108 964 24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe sc.exe PID 964 wrote to memory of 108 964 24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe sc.exe PID 964 wrote to memory of 108 964 24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe sc.exe PID 964 wrote to memory of 524 964 24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe sc.exe PID 964 wrote to memory of 524 964 24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe sc.exe PID 964 wrote to memory of 524 964 24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe sc.exe PID 964 wrote to memory of 524 964 24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe sc.exe PID 964 wrote to memory of 1888 964 24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe sc.exe PID 964 wrote to memory of 1888 964 24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe sc.exe PID 964 wrote to memory of 1888 964 24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe sc.exe PID 964 wrote to memory of 1888 964 24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe sc.exe PID 964 wrote to memory of 1620 964 24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe netsh.exe PID 964 wrote to memory of 1620 964 24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe netsh.exe PID 964 wrote to memory of 1620 964 24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe netsh.exe PID 964 wrote to memory of 1620 964 24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe netsh.exe PID 1488 wrote to memory of 472 1488 ycjtthrn.exe svchost.exe PID 1488 wrote to memory of 472 1488 ycjtthrn.exe svchost.exe PID 1488 wrote to memory of 472 1488 ycjtthrn.exe svchost.exe PID 1488 wrote to memory of 472 1488 ycjtthrn.exe svchost.exe PID 1488 wrote to memory of 472 1488 ycjtthrn.exe svchost.exe PID 1488 wrote to memory of 472 1488 ycjtthrn.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe"C:\Users\Admin\AppData\Local\Temp\24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\gwbsdvmy\2⤵PID:1060
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ycjtthrn.exe" C:\Windows\SysWOW64\gwbsdvmy\2⤵PID:2028
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create gwbsdvmy binPath= "C:\Windows\SysWOW64\gwbsdvmy\ycjtthrn.exe /d\"C:\Users\Admin\AppData\Local\Temp\24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:108
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description gwbsdvmy "wifi internet conection"2⤵
- Launches sc.exe
PID:524
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start gwbsdvmy2⤵
- Launches sc.exe
PID:1888
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:1620
-
-
C:\Windows\SysWOW64\gwbsdvmy\ycjtthrn.exeC:\Windows\SysWOW64\gwbsdvmy\ycjtthrn.exe /d"C:\Users\Admin\AppData\Local\Temp\24a4530516dfca76a310740a3abeb76b546956d54144bf96d45cba853f9dc916.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
PID:472
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.2MB
MD57bbe4241abdc00cd7c7d9189e86f8e94
SHA1561000dbd19900b4247def2472d8ed01f89d2c9a
SHA256e086890594754cb4f2d882500b26f3098cd202b6a26fb25bfdef4eb6dcd272b7
SHA512193178663774627d4f684c1946dd80b1d8fe32b0c2712bc33df8d8af355b26ece8545935efc65ce9c4673486a4e9963ecd5c13da4de88a59143206ed208e6cc6
-
Filesize
11.2MB
MD57bbe4241abdc00cd7c7d9189e86f8e94
SHA1561000dbd19900b4247def2472d8ed01f89d2c9a
SHA256e086890594754cb4f2d882500b26f3098cd202b6a26fb25bfdef4eb6dcd272b7
SHA512193178663774627d4f684c1946dd80b1d8fe32b0c2712bc33df8d8af355b26ece8545935efc65ce9c4673486a4e9963ecd5c13da4de88a59143206ed208e6cc6