Analysis
-
max time kernel
148s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 12:03
Static task
static1
Behavioral task
behavioral1
Sample
5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe
Resource
win10v2004-20220721-en
General
-
Target
5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe
-
Size
102KB
-
MD5
58c848f7841d332fc990a34e4ebe87d0
-
SHA1
5ef60b4f3aba6c5fbc0f37dd0fab98e207801710
-
SHA256
5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89
-
SHA512
596a8d135ca17dfdfaa3b2a6d8f2ccc14073c711224023b26fa8c8d4003ce54ee96c0884140e4e22af4ce05d7783298ad499fabb01a28ec5cb23e99a335c5381
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\gviibcyw = "0" svchost.exe -
Creates new service(s) 1 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
zpvopxnw.exepid process 1540 zpvopxnw.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\gviibcyw\ImagePath = "C:\\Windows\\SysWOW64\\gviibcyw\\zpvopxnw.exe" svchost.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 240 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
zpvopxnw.exedescription pid process target process PID 1540 set thread context of 240 1540 zpvopxnw.exe svchost.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 1732 sc.exe 1284 sc.exe 1256 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exezpvopxnw.exedescription pid process target process PID 968 wrote to memory of 1064 968 5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe cmd.exe PID 968 wrote to memory of 1064 968 5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe cmd.exe PID 968 wrote to memory of 1064 968 5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe cmd.exe PID 968 wrote to memory of 1064 968 5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe cmd.exe PID 968 wrote to memory of 952 968 5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe cmd.exe PID 968 wrote to memory of 952 968 5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe cmd.exe PID 968 wrote to memory of 952 968 5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe cmd.exe PID 968 wrote to memory of 952 968 5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe cmd.exe PID 968 wrote to memory of 1732 968 5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe sc.exe PID 968 wrote to memory of 1732 968 5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe sc.exe PID 968 wrote to memory of 1732 968 5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe sc.exe PID 968 wrote to memory of 1732 968 5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe sc.exe PID 968 wrote to memory of 1284 968 5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe sc.exe PID 968 wrote to memory of 1284 968 5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe sc.exe PID 968 wrote to memory of 1284 968 5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe sc.exe PID 968 wrote to memory of 1284 968 5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe sc.exe PID 968 wrote to memory of 1256 968 5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe sc.exe PID 968 wrote to memory of 1256 968 5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe sc.exe PID 968 wrote to memory of 1256 968 5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe sc.exe PID 968 wrote to memory of 1256 968 5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe sc.exe PID 968 wrote to memory of 1496 968 5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe netsh.exe PID 968 wrote to memory of 1496 968 5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe netsh.exe PID 968 wrote to memory of 1496 968 5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe netsh.exe PID 968 wrote to memory of 1496 968 5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe netsh.exe PID 1540 wrote to memory of 240 1540 zpvopxnw.exe svchost.exe PID 1540 wrote to memory of 240 1540 zpvopxnw.exe svchost.exe PID 1540 wrote to memory of 240 1540 zpvopxnw.exe svchost.exe PID 1540 wrote to memory of 240 1540 zpvopxnw.exe svchost.exe PID 1540 wrote to memory of 240 1540 zpvopxnw.exe svchost.exe PID 1540 wrote to memory of 240 1540 zpvopxnw.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe"C:\Users\Admin\AppData\Local\Temp\5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\gviibcyw\2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\zpvopxnw.exe" C:\Windows\SysWOW64\gviibcyw\2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create gviibcyw binPath= "C:\Windows\SysWOW64\gviibcyw\zpvopxnw.exe /d\"C:\Users\Admin\AppData\Local\Temp\5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description gviibcyw "wifi internet conection"2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start gviibcyw2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\gviibcyw\zpvopxnw.exeC:\Windows\SysWOW64\gviibcyw\zpvopxnw.exe /d"C:\Users\Admin\AppData\Local\Temp\5f662e5221809ede2d9bb46fb3be36fb15d4e6b35921c9c34c2412775ef00d89.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\zpvopxnw.exeFilesize
12.8MB
MD50b25fadd0ba4cf93b87b73e3142c42e4
SHA1f31c8a46263083c53be9f37928ccfa2c444bfe4a
SHA256b0e2dd1916ccc0cfd92372113ce32167d7e56112f81371e208e4c7f809861bc0
SHA512e4d469e08cf8e8edcdbc1a624c0aeace5df63c83f13dc98a2c5db5dccb5364e5fbf8474bde3c1381c9c98dedd4927f3f89c99c4dfcbfd97bfe9bd0d56b91031b
-
C:\Windows\SysWOW64\gviibcyw\zpvopxnw.exeFilesize
12.8MB
MD50b25fadd0ba4cf93b87b73e3142c42e4
SHA1f31c8a46263083c53be9f37928ccfa2c444bfe4a
SHA256b0e2dd1916ccc0cfd92372113ce32167d7e56112f81371e208e4c7f809861bc0
SHA512e4d469e08cf8e8edcdbc1a624c0aeace5df63c83f13dc98a2c5db5dccb5364e5fbf8474bde3c1381c9c98dedd4927f3f89c99c4dfcbfd97bfe9bd0d56b91031b
-
memory/240-70-0x0000000000089A6B-mapping.dmp
-
memory/240-67-0x0000000000080000-0x0000000000095000-memory.dmpFilesize
84KB
-
memory/240-75-0x0000000000080000-0x0000000000095000-memory.dmpFilesize
84KB
-
memory/240-74-0x0000000000080000-0x0000000000095000-memory.dmpFilesize
84KB
-
memory/240-69-0x0000000000080000-0x0000000000095000-memory.dmpFilesize
84KB
-
memory/952-57-0x0000000000000000-mapping.dmp
-
memory/968-54-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/968-55-0x0000000075211000-0x0000000075213000-memory.dmpFilesize
8KB
-
memory/1064-56-0x0000000000000000-mapping.dmp
-
memory/1256-61-0x0000000000000000-mapping.dmp
-
memory/1284-60-0x0000000000000000-mapping.dmp
-
memory/1496-62-0x0000000000000000-mapping.dmp
-
memory/1540-65-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/1732-59-0x0000000000000000-mapping.dmp