Analysis
-
max time kernel
150s -
max time network
190s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 11:18
Static task
static1
Behavioral task
behavioral1
Sample
395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe
Resource
win10v2004-20220414-en
General
-
Target
395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe
-
Size
142KB
-
MD5
fb665d4a9976f7a8d7d53b4ee8d3a3fd
-
SHA1
b2bcda3ea607a76f1f96d7b464bcec2950bc3da4
-
SHA256
395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c
-
SHA512
78bcc6ac3db476f1bb330c3bbf0fd18306d184c1b2ca189aa20bbd5dd0728a824f475141375ccb194aac76aefde1afc6dcfc0d34e348d8bc415f86dcf4f55ad7
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Executes dropped EXE 2 IoCs
Processes:
tplxmbig.exepyoihgpf.exepid process 844 tplxmbig.exe 1484 pyoihgpf.exe -
Modifies Windows Firewall 1 TTPs 2 IoCs
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\oydiena\ImagePath = "C:\\Windows\\SysWOW64\\oydiena\\pyoihgpf.exe" svchost.exe -
Loads dropped DLL 2 IoCs
Processes:
395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exepid process 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\isxcyhu = "\"C:\\Users\\Admin\\tplxmbig.exe\"" 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
pyoihgpf.exedescription pid process target process PID 1484 set thread context of 1108 1484 pyoihgpf.exe svchost.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exepid process 1336 sc.exe 1908 sc.exe 2000 sc.exe 1072 sc.exe 520 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exetplxmbig.exepyoihgpf.exedescription pid process target process PID 624 wrote to memory of 2028 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe cmd.exe PID 624 wrote to memory of 2028 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe cmd.exe PID 624 wrote to memory of 2028 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe cmd.exe PID 624 wrote to memory of 2028 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe cmd.exe PID 624 wrote to memory of 1992 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe cmd.exe PID 624 wrote to memory of 1992 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe cmd.exe PID 624 wrote to memory of 1992 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe cmd.exe PID 624 wrote to memory of 1992 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe cmd.exe PID 624 wrote to memory of 2000 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe sc.exe PID 624 wrote to memory of 2000 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe sc.exe PID 624 wrote to memory of 2000 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe sc.exe PID 624 wrote to memory of 2000 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe sc.exe PID 624 wrote to memory of 1072 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe sc.exe PID 624 wrote to memory of 1072 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe sc.exe PID 624 wrote to memory of 1072 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe sc.exe PID 624 wrote to memory of 1072 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe sc.exe PID 624 wrote to memory of 520 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe sc.exe PID 624 wrote to memory of 520 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe sc.exe PID 624 wrote to memory of 520 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe sc.exe PID 624 wrote to memory of 520 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe sc.exe PID 624 wrote to memory of 2044 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe netsh.exe PID 624 wrote to memory of 2044 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe netsh.exe PID 624 wrote to memory of 2044 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe netsh.exe PID 624 wrote to memory of 2044 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe netsh.exe PID 624 wrote to memory of 844 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe tplxmbig.exe PID 624 wrote to memory of 844 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe tplxmbig.exe PID 624 wrote to memory of 844 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe tplxmbig.exe PID 624 wrote to memory of 844 624 395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe tplxmbig.exe PID 844 wrote to memory of 1708 844 tplxmbig.exe cmd.exe PID 844 wrote to memory of 1708 844 tplxmbig.exe cmd.exe PID 844 wrote to memory of 1708 844 tplxmbig.exe cmd.exe PID 844 wrote to memory of 1708 844 tplxmbig.exe cmd.exe PID 844 wrote to memory of 1336 844 tplxmbig.exe sc.exe PID 844 wrote to memory of 1336 844 tplxmbig.exe sc.exe PID 844 wrote to memory of 1336 844 tplxmbig.exe sc.exe PID 844 wrote to memory of 1336 844 tplxmbig.exe sc.exe PID 844 wrote to memory of 1908 844 tplxmbig.exe sc.exe PID 844 wrote to memory of 1908 844 tplxmbig.exe sc.exe PID 844 wrote to memory of 1908 844 tplxmbig.exe sc.exe PID 844 wrote to memory of 1908 844 tplxmbig.exe sc.exe PID 844 wrote to memory of 1568 844 tplxmbig.exe netsh.exe PID 844 wrote to memory of 1568 844 tplxmbig.exe netsh.exe PID 844 wrote to memory of 1568 844 tplxmbig.exe netsh.exe PID 844 wrote to memory of 1568 844 tplxmbig.exe netsh.exe PID 1484 wrote to memory of 1108 1484 pyoihgpf.exe svchost.exe PID 1484 wrote to memory of 1108 1484 pyoihgpf.exe svchost.exe PID 1484 wrote to memory of 1108 1484 pyoihgpf.exe svchost.exe PID 1484 wrote to memory of 1108 1484 pyoihgpf.exe svchost.exe PID 1484 wrote to memory of 1108 1484 pyoihgpf.exe svchost.exe PID 1484 wrote to memory of 1108 1484 pyoihgpf.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe"C:\Users\Admin\AppData\Local\Temp\395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\oydiena\2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\xvjvwrpv.exe" C:\Windows\SysWOW64\oydiena\2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create oydiena binPath= "C:\Windows\SysWOW64\oydiena\xvjvwrpv.exe /d\"C:\Users\Admin\AppData\Local\Temp\395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description oydiena "wifi internet conection"2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start oydiena2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
-
C:\Users\Admin\tplxmbig.exe"C:\Users\Admin\tplxmbig.exe" /d"C:\Users\Admin\AppData\Local\Temp\395523cf56f7bb9497764d72ed71bab457bc86cd338e46ee4efe470777c6670c.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\pyoihgpf.exe" C:\Windows\SysWOW64\oydiena\3⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config oydiena binPath= "C:\Windows\SysWOW64\oydiena\pyoihgpf.exe /d\"C:\Users\Admin\tplxmbig.exe\""3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start oydiena3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul3⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\oydiena\pyoihgpf.exeC:\Windows\SysWOW64\oydiena\pyoihgpf.exe /d"C:\Users\Admin\tplxmbig.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\pyoihgpf.exeFilesize
13.9MB
MD5ed785ae3a12e7381b260e65a23489cdc
SHA15dde99f9fcbd8aba3f0034a959c6a76136a21871
SHA2567658610c25dd9ca0feae82c8cfec1f793486eb3c786a64dee8562d7bf7e73edb
SHA512db982b0801f0b9a3e1919c043e0c9a1a7c98d0837cfccd8a31045bd61e0947e9bba77e355e838c200e4adf6dc8cc255ab2fe32d5806940ce3e4a99c87d919e40
-
C:\Users\Admin\tplxmbig.exeFilesize
14.9MB
MD50292e73d8635f20b4d8f7d7214f5a2be
SHA13e55f1155206b339c9cbedbb225e643d08c2d9e4
SHA25688592d35d625fe61ba923bcde49de634835728108f07d1667be266d4d123d641
SHA5123b1c2434cfa48c503a7be3fb99cd7f38b616d82d06604d867e6671f8db7f6838c4ec244dc0aa16c364b49251c68c936e14795fd635cecdb1254a5c983c83f2b4
-
C:\Users\Admin\tplxmbig.exeFilesize
14.9MB
MD50292e73d8635f20b4d8f7d7214f5a2be
SHA13e55f1155206b339c9cbedbb225e643d08c2d9e4
SHA25688592d35d625fe61ba923bcde49de634835728108f07d1667be266d4d123d641
SHA5123b1c2434cfa48c503a7be3fb99cd7f38b616d82d06604d867e6671f8db7f6838c4ec244dc0aa16c364b49251c68c936e14795fd635cecdb1254a5c983c83f2b4
-
C:\Windows\SysWOW64\oydiena\pyoihgpf.exeFilesize
13.9MB
MD5ed785ae3a12e7381b260e65a23489cdc
SHA15dde99f9fcbd8aba3f0034a959c6a76136a21871
SHA2567658610c25dd9ca0feae82c8cfec1f793486eb3c786a64dee8562d7bf7e73edb
SHA512db982b0801f0b9a3e1919c043e0c9a1a7c98d0837cfccd8a31045bd61e0947e9bba77e355e838c200e4adf6dc8cc255ab2fe32d5806940ce3e4a99c87d919e40
-
\Users\Admin\tplxmbig.exeFilesize
14.9MB
MD50292e73d8635f20b4d8f7d7214f5a2be
SHA13e55f1155206b339c9cbedbb225e643d08c2d9e4
SHA25688592d35d625fe61ba923bcde49de634835728108f07d1667be266d4d123d641
SHA5123b1c2434cfa48c503a7be3fb99cd7f38b616d82d06604d867e6671f8db7f6838c4ec244dc0aa16c364b49251c68c936e14795fd635cecdb1254a5c983c83f2b4
-
\Users\Admin\tplxmbig.exeFilesize
14.9MB
MD50292e73d8635f20b4d8f7d7214f5a2be
SHA13e55f1155206b339c9cbedbb225e643d08c2d9e4
SHA25688592d35d625fe61ba923bcde49de634835728108f07d1667be266d4d123d641
SHA5123b1c2434cfa48c503a7be3fb99cd7f38b616d82d06604d867e6671f8db7f6838c4ec244dc0aa16c364b49251c68c936e14795fd635cecdb1254a5c983c83f2b4
-
memory/520-60-0x0000000000000000-mapping.dmp
-
memory/624-54-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/624-55-0x0000000075801000-0x0000000075803000-memory.dmpFilesize
8KB
-
memory/844-67-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/844-64-0x0000000000000000-mapping.dmp
-
memory/1072-59-0x0000000000000000-mapping.dmp
-
memory/1108-85-0x0000000000080000-0x0000000000095000-memory.dmpFilesize
84KB
-
memory/1108-81-0x0000000000080000-0x0000000000095000-memory.dmpFilesize
84KB
-
memory/1108-86-0x0000000000080000-0x0000000000095000-memory.dmpFilesize
84KB
-
memory/1108-79-0x0000000000080000-0x0000000000095000-memory.dmpFilesize
84KB
-
memory/1108-82-0x0000000000089A6B-mapping.dmp
-
memory/1336-72-0x0000000000000000-mapping.dmp
-
memory/1484-77-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/1568-75-0x0000000000000000-mapping.dmp
-
memory/1708-70-0x0000000000000000-mapping.dmp
-
memory/1908-73-0x0000000000000000-mapping.dmp
-
memory/1992-57-0x0000000000000000-mapping.dmp
-
memory/2000-58-0x0000000000000000-mapping.dmp
-
memory/2028-56-0x0000000000000000-mapping.dmp
-
memory/2044-61-0x0000000000000000-mapping.dmp