Analysis
-
max time kernel
28s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:46
Behavioral task
behavioral1
Sample
bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe
Resource
win7-20220812-en
General
-
Target
bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe
-
Size
447KB
-
MD5
b11ac9f1dc4bc69b0e9e4fd9e70f3c2f
-
SHA1
6cb25247dc4fc65c157052dc619f9903193a53ad
-
SHA256
bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2
-
SHA512
ff1317947b517aa1fcd52ac6e41c84fd0d168a501a710b6ebf62557ebbc1f1a8aa4b39bf30335d71e7a2c6382b14b60c83a640c261083b83e29814d682edbbbf
-
SSDEEP
12288:QjkArEN249AyE/rbaMct4bO2/VAZPYJ2pfsLEuhi4B:LFE//Tct4bOs/mUthN
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 3 IoCs
Processes:
netsh.exenetsh.exenetsh.exepid process 1996 netsh.exe 868 netsh.exe 1800 netsh.exe -
Processes:
resource yara_rule \TozomaaSO\TozomaaSO.exe upx \TozomaaSO\TozomaaSO.exe upx \TozomaaSO\TozomaaSO.exe upx behavioral1/memory/884-58-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/884-60-0x0000000002530000-0x0000000002540000-memory.dmp upx behavioral1/memory/884-67-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/884-70-0x0000000000400000-0x00000000004C1000-memory.dmp upx -
Loads dropped DLL 3 IoCs
Processes:
bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exepid process 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/884-58-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral1/memory/884-67-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral1/memory/884-70-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 17 IoCs
Processes:
bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exepid process 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe -
Suspicious use of SendNotifyMessage 17 IoCs
Processes:
bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exepid process 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exedescription pid process target process PID 884 wrote to memory of 1800 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe netsh.exe PID 884 wrote to memory of 1800 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe netsh.exe PID 884 wrote to memory of 1800 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe netsh.exe PID 884 wrote to memory of 1800 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe netsh.exe PID 884 wrote to memory of 1996 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe netsh.exe PID 884 wrote to memory of 1996 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe netsh.exe PID 884 wrote to memory of 1996 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe netsh.exe PID 884 wrote to memory of 1996 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe netsh.exe PID 884 wrote to memory of 868 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe netsh.exe PID 884 wrote to memory of 868 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe netsh.exe PID 884 wrote to memory of 868 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe netsh.exe PID 884 wrote to memory of 868 884 bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe"C:\Users\Admin\AppData\Local\Temp\bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall show rule name="TozomaaSO_Update"2⤵
- Modifies Windows Firewall
PID:1800 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule name=TozomaaSO_BG2⤵
- Modifies Windows Firewall
PID:1996 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="TozomaaSO_BG" dir=in action=allow program="C:\TozomaaSO\TozomaaBG.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:868
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
447KB
MD5b11ac9f1dc4bc69b0e9e4fd9e70f3c2f
SHA16cb25247dc4fc65c157052dc619f9903193a53ad
SHA256bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2
SHA512ff1317947b517aa1fcd52ac6e41c84fd0d168a501a710b6ebf62557ebbc1f1a8aa4b39bf30335d71e7a2c6382b14b60c83a640c261083b83e29814d682edbbbf
-
Filesize
447KB
MD5b11ac9f1dc4bc69b0e9e4fd9e70f3c2f
SHA16cb25247dc4fc65c157052dc619f9903193a53ad
SHA256bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2
SHA512ff1317947b517aa1fcd52ac6e41c84fd0d168a501a710b6ebf62557ebbc1f1a8aa4b39bf30335d71e7a2c6382b14b60c83a640c261083b83e29814d682edbbbf
-
Filesize
447KB
MD5b11ac9f1dc4bc69b0e9e4fd9e70f3c2f
SHA16cb25247dc4fc65c157052dc619f9903193a53ad
SHA256bfd15ec46638355608d5f63c139b1369c9f88ed7dbde7685af1b8e8b85efaca2
SHA512ff1317947b517aa1fcd52ac6e41c84fd0d168a501a710b6ebf62557ebbc1f1a8aa4b39bf30335d71e7a2c6382b14b60c83a640c261083b83e29814d682edbbbf