Analysis
-
max time kernel
168s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-06-2022 05:19
Static task
static1
Behavioral task
behavioral1
Sample
2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676.exe
Resource
win10v2004-20220414-en
General
-
Target
2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676.exe
-
Size
152KB
-
MD5
8c49fb45ab38659a7e1c22685a2578c9
-
SHA1
9c2e7120232d29d7bb75797d8256dafb8bb424b1
-
SHA256
2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676
-
SHA512
4189f9fa47a92eee0456ceb4f90ac595abc83eebd003cfd88980018ec50075683a6fff00f20c418801d50057d61363795bfa1d4794cc0e7794a3067baf3450bc
Malware Config
Extracted
tofsee
91.218.38.245
188.165.132.183
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
mzwgnguz.exepid process 1088 mzwgnguz.exe -
Processes:
resource yara_rule behavioral1/memory/1560-55-0x0000000000400000-0x0000000000453000-memory.dmp upx \Users\Admin\mzwgnguz.exe upx \Users\Admin\mzwgnguz.exe upx C:\Users\Admin\mzwgnguz.exe upx C:\Users\Admin\mzwgnguz.exe upx -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1768 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676.exepid process 1560 2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676.exe 1560 2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\mzwgnguz.exe\"" 2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676.exemzwgnguz.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum mzwgnguz.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 mzwgnguz.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
mzwgnguz.exedescription pid process target process PID 1088 set thread context of 2044 1088 mzwgnguz.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676.exemzwgnguz.exedescription pid process target process PID 1560 wrote to memory of 1088 1560 2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676.exe mzwgnguz.exe PID 1560 wrote to memory of 1088 1560 2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676.exe mzwgnguz.exe PID 1560 wrote to memory of 1088 1560 2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676.exe mzwgnguz.exe PID 1560 wrote to memory of 1088 1560 2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676.exe mzwgnguz.exe PID 1560 wrote to memory of 1768 1560 2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676.exe cmd.exe PID 1560 wrote to memory of 1768 1560 2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676.exe cmd.exe PID 1560 wrote to memory of 1768 1560 2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676.exe cmd.exe PID 1560 wrote to memory of 1768 1560 2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676.exe cmd.exe PID 1088 wrote to memory of 2044 1088 mzwgnguz.exe svchost.exe PID 1088 wrote to memory of 2044 1088 mzwgnguz.exe svchost.exe PID 1088 wrote to memory of 2044 1088 mzwgnguz.exe svchost.exe PID 1088 wrote to memory of 2044 1088 mzwgnguz.exe svchost.exe PID 1088 wrote to memory of 2044 1088 mzwgnguz.exe svchost.exe PID 1088 wrote to memory of 2044 1088 mzwgnguz.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676.exe"C:\Users\Admin\AppData\Local\Temp\2267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\mzwgnguz.exe"C:\Users\Admin\mzwgnguz.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2044
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\3251.bat" "2⤵
- Deletes itself
PID:1768
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
302B
MD580bc4a36793afa7cf72a4a173ae48553
SHA1c13608f3fe63ac67e7042447691d0dd95e88bf9d
SHA256b7571be744d84d2042554f79d4a922d00da7d42d44e8a674e3454715b83af8f6
SHA512a4a50cfdc2813dfa0595a49f3e82b8132831505fe4794f5742df7da225a16ba97e71d6b2fb08a80cf6c20847f91740f5bfc81ec3c143ec777d7c99a22e2b2197
-
Filesize
152KB
MD58c49fb45ab38659a7e1c22685a2578c9
SHA19c2e7120232d29d7bb75797d8256dafb8bb424b1
SHA2562267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676
SHA5124189f9fa47a92eee0456ceb4f90ac595abc83eebd003cfd88980018ec50075683a6fff00f20c418801d50057d61363795bfa1d4794cc0e7794a3067baf3450bc
-
Filesize
152KB
MD58c49fb45ab38659a7e1c22685a2578c9
SHA19c2e7120232d29d7bb75797d8256dafb8bb424b1
SHA2562267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676
SHA5124189f9fa47a92eee0456ceb4f90ac595abc83eebd003cfd88980018ec50075683a6fff00f20c418801d50057d61363795bfa1d4794cc0e7794a3067baf3450bc
-
Filesize
152KB
MD58c49fb45ab38659a7e1c22685a2578c9
SHA19c2e7120232d29d7bb75797d8256dafb8bb424b1
SHA2562267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676
SHA5124189f9fa47a92eee0456ceb4f90ac595abc83eebd003cfd88980018ec50075683a6fff00f20c418801d50057d61363795bfa1d4794cc0e7794a3067baf3450bc
-
Filesize
152KB
MD58c49fb45ab38659a7e1c22685a2578c9
SHA19c2e7120232d29d7bb75797d8256dafb8bb424b1
SHA2562267e3a4b504a7cdf3c191f385a2233f40843ba18c06b7d745b8f78329537676
SHA5124189f9fa47a92eee0456ceb4f90ac595abc83eebd003cfd88980018ec50075683a6fff00f20c418801d50057d61363795bfa1d4794cc0e7794a3067baf3450bc