Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-07-2022 16:27
Static task
static1
Behavioral task
behavioral1
Sample
3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe
Resource
win10v2004-20220414-en
General
-
Target
3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe
-
Size
139KB
-
MD5
a2300b70e5420a971e380a21c4469387
-
SHA1
3fbd333c6314e91f9adf89a1b32186156c6d34bb
-
SHA256
3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560
-
SHA512
2fbab93c5e9c50d5a1d8a03a3e26b0d13f84cd442afe2cd35e51c900e8495fb873abd49da2e83e7df1318f5297fde44355755acc92e8f2176b1de6246c2f1a03
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\tnsqxqfn = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
aelvvjtp.exepid process 1900 aelvvjtp.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\tnsqxqfn\ImagePath = "C:\\Windows\\SysWOW64\\tnsqxqfn\\aelvvjtp.exe" svchost.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 1016 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
aelvvjtp.exedescription pid process target process PID 1900 set thread context of 1016 1900 aelvvjtp.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 2008 sc.exe 1368 sc.exe 1764 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exeaelvvjtp.exedescription pid process target process PID 1800 wrote to memory of 960 1800 3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe cmd.exe PID 1800 wrote to memory of 960 1800 3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe cmd.exe PID 1800 wrote to memory of 960 1800 3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe cmd.exe PID 1800 wrote to memory of 960 1800 3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe cmd.exe PID 1800 wrote to memory of 1760 1800 3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe cmd.exe PID 1800 wrote to memory of 1760 1800 3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe cmd.exe PID 1800 wrote to memory of 1760 1800 3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe cmd.exe PID 1800 wrote to memory of 1760 1800 3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe cmd.exe PID 1800 wrote to memory of 1764 1800 3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe sc.exe PID 1800 wrote to memory of 1764 1800 3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe sc.exe PID 1800 wrote to memory of 1764 1800 3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe sc.exe PID 1800 wrote to memory of 1764 1800 3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe sc.exe PID 1800 wrote to memory of 2008 1800 3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe sc.exe PID 1800 wrote to memory of 2008 1800 3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe sc.exe PID 1800 wrote to memory of 2008 1800 3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe sc.exe PID 1800 wrote to memory of 2008 1800 3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe sc.exe PID 1800 wrote to memory of 1368 1800 3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe sc.exe PID 1800 wrote to memory of 1368 1800 3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe sc.exe PID 1800 wrote to memory of 1368 1800 3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe sc.exe PID 1800 wrote to memory of 1368 1800 3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe sc.exe PID 1800 wrote to memory of 1472 1800 3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe netsh.exe PID 1800 wrote to memory of 1472 1800 3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe netsh.exe PID 1800 wrote to memory of 1472 1800 3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe netsh.exe PID 1800 wrote to memory of 1472 1800 3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe netsh.exe PID 1900 wrote to memory of 1016 1900 aelvvjtp.exe svchost.exe PID 1900 wrote to memory of 1016 1900 aelvvjtp.exe svchost.exe PID 1900 wrote to memory of 1016 1900 aelvvjtp.exe svchost.exe PID 1900 wrote to memory of 1016 1900 aelvvjtp.exe svchost.exe PID 1900 wrote to memory of 1016 1900 aelvvjtp.exe svchost.exe PID 1900 wrote to memory of 1016 1900 aelvvjtp.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe"C:\Users\Admin\AppData\Local\Temp\3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\tnsqxqfn\2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\aelvvjtp.exe" C:\Windows\SysWOW64\tnsqxqfn\2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create tnsqxqfn binPath= "C:\Windows\SysWOW64\tnsqxqfn\aelvvjtp.exe /d\"C:\Users\Admin\AppData\Local\Temp\3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description tnsqxqfn "wifi internet conection"2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start tnsqxqfn2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\tnsqxqfn\aelvvjtp.exeC:\Windows\SysWOW64\tnsqxqfn\aelvvjtp.exe /d"C:\Users\Admin\AppData\Local\Temp\3b716928bfac2bcc66212be3f9ab5a072ef620edf3e4b69148e4ecf14e634560.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\aelvvjtp.exeFilesize
12.7MB
MD590be1658a0b73ad945513e33ec9db46c
SHA163590b95823de759fab94cec29adcbdebd805bdf
SHA256aad3ddd372cb1ba6bab81be5ed77ce4024f3d6f006389cda9ef484aa29122daa
SHA51291d65805e02303931c06c321f889fa4c27b41097aeb1d907f8c59a812d58869dad6ce81311c7fa67ba088d7743974b7a1a3b1156dee74c3c4ec959d895e6240b
-
C:\Windows\SysWOW64\tnsqxqfn\aelvvjtp.exeFilesize
12.7MB
MD590be1658a0b73ad945513e33ec9db46c
SHA163590b95823de759fab94cec29adcbdebd805bdf
SHA256aad3ddd372cb1ba6bab81be5ed77ce4024f3d6f006389cda9ef484aa29122daa
SHA51291d65805e02303931c06c321f889fa4c27b41097aeb1d907f8c59a812d58869dad6ce81311c7fa67ba088d7743974b7a1a3b1156dee74c3c4ec959d895e6240b
-
memory/960-56-0x0000000000000000-mapping.dmp
-
memory/1016-67-0x00000000000C0000-0x00000000000D5000-memory.dmpFilesize
84KB
-
memory/1016-75-0x00000000000C0000-0x00000000000D5000-memory.dmpFilesize
84KB
-
memory/1016-74-0x00000000000C0000-0x00000000000D5000-memory.dmpFilesize
84KB
-
memory/1016-73-0x00000000000C0000-0x00000000000D5000-memory.dmpFilesize
84KB
-
memory/1016-70-0x00000000000C9A6B-mapping.dmp
-
memory/1016-69-0x00000000000C0000-0x00000000000D5000-memory.dmpFilesize
84KB
-
memory/1368-61-0x0000000000000000-mapping.dmp
-
memory/1472-63-0x0000000000000000-mapping.dmp
-
memory/1760-57-0x0000000000000000-mapping.dmp
-
memory/1764-59-0x0000000000000000-mapping.dmp
-
memory/1800-54-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/1800-55-0x0000000075C71000-0x0000000075C73000-memory.dmpFilesize
8KB
-
memory/1900-65-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/2008-60-0x0000000000000000-mapping.dmp